X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (39365) 39365
Journal Article (3658) 3658
Newsletter (3229) 3229
Magazine Article (2849) 2849
Trade Publication Article (1691) 1691
Government Document (727) 727
Book / eBook (490) 490
Web Resource (319) 319
Book Chapter (241) 241
Transcript (177) 177
Streaming Video (155) 155
Conference Proceeding (104) 104
Reference (77) 77
Publication (49) 49
Dissertation (38) 38
Book Review (31) 31
Video Recording (10) 10
Paper (2) 2
Library Holding (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cyberterrorism (50786) 50786
safety and security measures (26848) 26848
internet (25538) 25538
data security (19873) 19873
computer security (4639) 4639
computer hackers (4201) 4201
laws, regulations and rules (4138) 4138
reports (3711) 3711
political aspects (2829) 2829
network security (2719) 2719
computer software industry (2367) 2367
security management (2190) 2190
internet crime (2057) 2057
national security (1996) 1996
prevention (1735) 1735
control systems (1614) 1614
forecasts and trends (1614) 1614
conferences, meetings and seminars (1448) 1448
privacy (1369) 1369
infrastructure (1309) 1309
spyware (1288) 1288
data encryption (1244) 1244
surveys (1191) 1191
data integrity (1057) 1057
bills, legislative (1003) 1003
computer crimes (952) 952
computer viruses (896) 896
software (895) 895
control (881) 881
computer networks (862) 862
legislators (856) 856
security measures (844) 844
analysis (829) 829
investigations (826) 826
methods (729) 729
security software (700) 700
security services (685) 685
social networks (677) 677
periodical publishing (675) 675
research (634) 634
denial of service attacks (633) 633
communications industry (626) 626
identity theft (626) 626
telecommunications services industry (624) 624
innovations (621) 621
phishing (602) 602
planning (601) 601
web sites (601) 601
universities and colleges (599) 599
threats (593) 593
cloud computing (592) 592
malware (591) 591
united states (590) 590
small business (588) 588
artificial intelligence (585) 585
automation (584) 584
computer industry (584) 584
statistics (581) 581
banking industry (561) 561
security programs (560) 560
banks (554) 554
management (537) 537
computers (536) 536
information technology (533) 533
government computer systems (532) 532
technology application (529) 529
training (523) 523
terrorism (516) 516
hackers (505) 505
financial services industry (497) 497
intellectual property (492) 492
political activity (489) 489
internet of things (467) 467
high technology industry (466) 466
executives (458) 458
risk management (455) 455
defense industry (449) 449
elections (449) 449
information management (429) 429
machine learning (425) 425
collaboration (420) 420
standards (419) 419
achievements and awards (418) 418
education (410) 410
government policy (403) 403
students (402) 402
computer science (401) 401
personal information (397) 397
officials and employees (396) 396
health care industry (394) 394
military aspects (393) 393
access control (391) 391
consumer electronics industry (391) 391
cyberspace (388) 388
medical equipment (386) 386
economic aspects (385) 385
security systems (385) 385
market research (378) 378
information warfare (377) 377
consulting services (368) 368
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (388) 388
Robarts - Stacks (135) 135
UofT at Mississauga - Stacks (35) 35
Collection Dvlpm't (Acquisitions) - Vendor file (33) 33
UofT at Scarborough - Stacks (21) 21
Engineering & Comp. Sci. - Stacks (18) 18
Law (Bora Laskin) - Stacks (18) 18
Trinity College (John W Graham) - Stacks (15) 15
St. Michael's College (John M. Kelly) - 2nd Floor (10) 10
UTL at Downsview - May be requested (7) 7
Media Commons - Audio Visual (6) 6
UofT Schools - Stacks (6) 6
Victoria University E.J. Pratt - Stacks (6) 6
Collection Dvlpm't (Acquisitions) - Closed Orders (4) 4
Criminology - Stacks (4) 4
Faculty of Information - Stacks (3) 3
Baycrest Hospital - Resident/Client Library (2) 2
East Asian (Cheng Yu Tung) - Stacks (2) 2
Thomas Fisher Rare Book - May be requested at Fisher (2) 2
Aerospace - Stacks (1) 1
Collection Dvlpm't (Acquisitions) - On order (1) 1
East Asian (Cheng Yu Tung) - Audio Visual (1) 1
Faculty of Information - Cataloguing (1) 1
Knox College (Caven) - Stacks (1) 1
Media Commons - Library or classroom use (1) 1
OISE - Audio Visual (1) 1
OISE - Children's Literature (1) 1
Regis College - Stacks (1) 1
Robarts - Government Pubs (1) 1
Robarts - Processing (1) 1
Robarts - Searching (1) 1
St. Michael's College (John M. Kelly) - 3rd Floor (1) 1
St. Michael's College (John M. Kelly) - Audio Visual (1) 1
University College (Laidlaw) - Stacks (1) 1
Victoria University E.J. Pratt - Reference (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (51035) 51035
French (29) 29
German (14) 14
Portuguese (8) 8
Spanish (7) 7
Korean (6) 6
Japanese (4) 4
Chinese (3) 3
Polish (3) 3
Arabic (2) 2
Swedish (2) 2
Turkish (2) 2
Afrikaans (1) 1
Hungarian (1) 1
Indonesian (1) 1
Persian (1) 1
Romanian (1) 1
Russian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Journal of Transportation Security, ISSN 1938-7741, 6/2011, Volume 4, Issue 2, pp. 131 - 143
Aviation is an important global business and a significant driver of the global economy. It is vital, therefore, that stringent measures are taken to counter... 
Technology Management | Economic Policy | Extradition | Bio terrorism | Aviation security | Cyber terrorism | Air and Space Law | Air rage | Production/Logistics | R & D/Technology Policy | Beijing Convention 2010 | Economics / Management Science | Terrorism | Aeronautics | Global economy | Studies | International law | Treaties | Aviation | Airline security | Conventions | Civil aviation | Security | Aircraft | Organizing
Journal Article
Information Security Journal: A Global Perspective, ISSN 1939-3555, 02/2011, Volume 20, Issue 1, pp. 34 - 44
This paper uses social network theory to compare the social network of the Jewish Revolt in 66-73 AD and the cyber terrorist attacks during the Kosovo war in... 
Jewish Revolt | cyber terrorism | networks | terrorism | social network theory | Jewish revolt | Networks | Terrorism | Social network theory | Cyber terrorism | Antiquities | Computer information security | Orientation | Terrorist attacks
Journal Article
Journal of Digital Forensic Practice, ISSN 1556-7281, 2010, Volume 3, Issue 2-4, pp. 115 - 123
This paper examines cyberterrorism and its potential to create a postmodern state of chaos. In general, chaos refers to a state of extreme confusion and... 
Chaos | Postmodernism | Terrorism | Cyberterrorism | Analog | Digital | Internet | Networks | Chaos theory | Blurring | Cyberspace | Cascading | Failure
Journal Article
Newsletter
1995, AD-a394 507.
With the advent of the information age the United States has lost the "sanctuary" that it has enjoyed for over 200 years. In the past ordinary citizens and... 
national security | emergencies | national defense | cyberterrorism | electronic security | civil defense
Government Document
1995, AD-a394 692.
Is Information War (IW) a nascent, perhaps embryonic art, or simply the newest version of a time-honored feature of warfare? Is it a new form of conflict that... 
electronic warfare | military doctrine | cyberterrorism | information warfare
Government Document
1995, AD-a393 251.
Information Warfare: Actions taken to achieve information superiority in support of national military strategy by affecting adversary information and... 
threat evaluation | briefing notes | information security | risk | cyberterrorism | department of defense | information systems | information warfare | electronic security
Government Document
1996, AD-a394 173.
On one level, Information Warfare (IW) and deterrence are well matched, but on other levels the two topics can be seen as orders of magnitude apart. IW covers... 
deterrence | propaganda | information security | cyberterrorism | information warfare | electronic security
Government Document
1996, AD-a394 073.
Information is emerging as the catalyst for a major change. It is redefining wealth and power in modern post-industrial societies. This paper discusses the... 
military organizations | military doctrine | information security | cyberterrorism | information warfare | electronic security
Government Document
1996, 1, ISBN 0833023527, xxiii, 90
Future U.S. national security strategy is likely to be profoundly affected by the ongoing, rapid evolution of cyberspace--the global information... 
Information warfare | History | Technology
Book
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.