X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (67560) 67560
Patent (45846) 45846
Journal Article (31886) 31886
Conference Proceeding (15253) 15253
Book Chapter (14171) 14171
Magazine Article (13485) 13485
Trade Publication Article (11836) 11836
Book / eBook (6060) 6060
Newsletter (4213) 4213
Publication (2764) 2764
Web Resource (2207) 2207
Report (1313) 1313
Book Review (613) 613
Dissertation (394) 394
Government Document (307) 307
Transcript (252) 252
Reference (164) 164
Paper (107) 107
Data Set (10) 10
Standard (8) 8
Streaming Video (5) 5
Journal / eJournal (4) 4
Technical Report (1) 1
Video Recording (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
data encryption (88598) 88598
physics (46469) 46469
computing (45813) 45813
counting (45773) 45773
calculating (45766) 45766
computer security (43452) 43452
electric digital data processing (37921) 37921
network security (30999) 30999
electricity (30150) 30150
electric communication technique (29751) 29751
transmission of digital information, e.g. telegraphiccommunication (27247) 27247
computer science (25312) 25312
data security (20000) 20000
computer communication networks (14669) 14669
data integrity (14426) 14426
cryptography (13101) 13101
security management (10267) 10267
internet (10265) 10265
software (10076) 10076
management of computing and information systems (9481) 9481
data processing systems or methods, specially adapted foradministrative, commercial, financial, managerial, supervisoryor forecasting purposes (8641) 8641
systems or methods specially adapted for administrative,commercial, financial, managerial, supervisory or forecastingpurposes, not otherwise provided for (8641) 8641
data structures, cryptology and information theory (8372) 8372
encryption (8198) 8198
privacy (8168) 8168
algorithm analysis and problem complexity (7811) 7811
inventors (7763) 7763
cloud computing (7671) 7671
coding and information theory (7450) 7450
information technology (7437) 7437
patents (7318) 7318
algorithms (7228) 7228
safety and security measures (7175) 7175
data encryption chips (6960) 6960
computers (6953) 6953
systems and data security (6447) 6447
internet crime (6159) 6159
product introduction (5902) 5902
methods (5841) 5841
access control (5809) 5809
computer software industry (5629) 5629
computer science, theory & methods (5559) 5559
operating systems (5527) 5527
computers and society (5526) 5526
security (5413) 5413
computer science, information systems (5213) 5213
education (5185) 5185
information systems applications (4955) 4955
handling record carriers (4916) 4916
presentation of data (4916) 4916
recognition of data (4916) 4916
record carriers (4916) 4916
advertising (4815) 4815
pictorial communication, e.g. television (4800) 4800
seals (4677) 4677
display (4676) 4676
discrete mathematics in computer science (4554) 4554
coding or ciphering apparatus for cryptographic or otherpurposes involving the need for secrecy (4414) 4414
computer networks (4304) 4304
analysis (4121) 4121
data bases (3883) 3883
computer viruses (3855) 3855
information storage (3629) 3629
wireless communications networks (3502) 3502
data processing (3462) 3462
wireless networks (3462) 3462
servers (3451) 3451
laws, regulations and rules (3429) 3429
usage (3404) 3404
computer science, general (3391) 3391
management (3363) 3363
security services (3346) 3346
engineering, electrical & electronic (3311) 3311
research (3245) 3245
electronic books (3222) 3222
intellectual property (3203) 3203
checking-devices (3198) 3198
telecommunications (3194) 3194
legal aspects of computing (3124) 3124
social networks (3037) 3037
compliance (3030) 3030
studies (2964) 2964
stock exchanges (2888) 2888
mathematics (2846) 2846
cyberterrorism (2845) 2845
security measures (2713) 2713
software industry (2698) 2698
information systems (2678) 2678
national security (2527) 2527
communication (2513) 2513
public key infrastructure (2470) 2470
internet of things (2465) 2465
electronic commerce (2446) 2446
computer science, software engineering (2441) 2441
artificial intelligence (2427) 2427
databases (2419) 2419
automation (2416) 2416
customer services (2414) 2414
authentication (2385) 2385
big data (2324) 2324
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (1674) 1674
Engineering & Comp. Sci. - Stacks (906) 906
UTL at Downsview - May be requested (533) 533
Gerstein Science - Stacks (463) 463
Robarts - Stacks (280) 280
UofT at Mississauga - Stacks (264) 264
Collection Dvlpm't (Acquisitions) - Closed Orders (251) 251
Collection Dvlpm't (Acquisitions) - Vendor file (196) 196
UofT at Scarborough - Stacks (180) 180
Faculty of Information - Stacks (89) 89
Law (Bora Laskin) - Stacks (78) 78
Mathematical Sciences - Stacks (41) 41
Faculty of Information - May be requested in 6-10 wks (34) 34
OISE - Stacks (30) 30
St. Michael's College (John M. Kelly) - 2nd Floor (30) 30
Engineering & Comp. Sci. - May be requested in 6-10 wks (26) 26
Engineering & Comp. Sci. - Missing (24) 24
Trinity College (John W Graham) - Stacks (21) 21
UofT at Mississauga - May be requested in 6-10 wks (13) 13
Astronomy & Astrophysics - Ask at library (12) 12
Music - Stacks (8) 8
Physics - Stacks (8) 8
Royal Ontario Museum - Stacks (8) 8
Trinity College (John W Graham) - Reference (8) 8
UofT at Mississauga - Reference (8) 8
Gerstein Science - Reference (6) 6
New College (Ivey) - Stacks (6) 6
Robarts - Reference (6) 6
Victoria University E.J. Pratt - Reference (6) 6
Aerospace - Stacks (5) 5
Architecture Landscape (Shore + Moffat) - Stacks (5) 5
Sunnybrook Health Sciences Centre - Sunnybrook Stacks (5) 5
UofT at Scarborough - Withdrawn (5) 5
Earth Sciences (Noranda) - Stacks (4) 4
Engineering & Comp. Sci. - Reference (4) 4
Gerstein Science - Circulation Desk (4) 4
Mathematical Sciences - Missing (4) 4
Providence Healthcare - Stacks (4) 4
UofT Schools - Stacks (4) 4
UofT at Scarborough - May be requested in 6-10 wks (4) 4
Victoria University E.J. Pratt - Stacks (4) 4
Baycrest Hospital - Stacks (3) 3
Collection Dvlpm't (Acquisitions) - Cancelled Order (3) 3
Law (Bora Laskin) - Closed Orders (3) 3
Map & Data - Map Collection (3) 3
Robarts - Government Pubs (3) 3
St. Michael's Hospital - Stacks (3) 3
UofT at Mississauga - Missing (3) 3
Credit Valley Hospital - Stacks (2) 2
Criminology - Reference (2) 2
Criminology - Stacks (2) 2
Engineering & Comp. Sci. - Periodical Stacks (2) 2
Faculty of Information - Subject Analysis Systems (2) 2
Indust. Rel's & Hum. Resources (Newman) - Library use only (2) 2
Law (Bora Laskin) - Theses (2) 2
Physics - Storage (2) 2
Robarts - Storage (2) 2
Scarborough Hospital - Birchmount (2) 2
Scarborough Hospital - General (2) 2
United Church of Canada Archives - Reference (2) 2
University College (Laidlaw) - Stacks (2) 2
Art - Library use only (1) 1
Baycrest Hospital - Resident/Client Library (1) 1
Business (Joseph L Rotman) - Stacks (1) 1
Chemistry (A D Allen) - Stacks (1) 1
Earth Sciences (Noranda) - Reference (1) 1
Engineering & Comp. Sci. - Circulation Desk (1) 1
Engineering & Comp. Sci. - Material is damaged (1) 1
Engineering & Comp. Sci. - May be requested (1) 1
Engineering & Comp. Sci. - Not Returned (1) 1
Engineering & Comp. Sci. - Searching (1) 1
Engineering & Comp. Sci. - Shipping from publisher (1) 1
Faculty of Information - Cook Bibliographic Control (1) 1
Faculty of Information - Reference (1) 1
Gerstein Science - May be requested in 6-10 wks (1) 1
Gerstein Science - Missing (1) 1
Gerstein Science - Not Returned (1) 1
Gerstein Science - Theses (1) 1
Holland Bloorview Kids Rehabilitation - Stacks (1) 1
Law (Bora Laskin) - Reserve desk (1) 1
Mathematical Sciences - Circulation Desk (1) 1
Mathematical Sciences - Storage (1) 1
Media Commons - Audio Visual (1) 1
Media Commons - Microtexts (1) 1
Media Commons - Storage (1) 1
Music - Missing (1) 1
OISE - Curriculum Resources (1) 1
OISE - May be requested in 6-10 wks (1) 1
OISE - Missing (1) 1
OISE - Reference (1) 1
OISE - Storage (1) 1
Physics - Circulation Desk (1) 1
Providence Healthcare - Withdrawn (1) 1
Richard Charles Lee Canada-Hong Kong - Library use only (1) 1
Robarts - Gov Pub Storage: Request at Reference Desk 4th floor (1) 1
Robarts - Internal dept (1) 1
Robarts - Microtexts (1) 1
Robarts - Not Returned (1) 1
Robarts - Reference Desk (1) 1
Royal Ontario Museum - Far Eastern Reference (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (196669) 196669
Chinese (11207) 11207
French (8835) 8835
German (6769) 6769
Korean (1925) 1925
Japanese (1764) 1764
Spanish (512) 512
Russian (246) 246
Portuguese (238) 238
Norwegian (57) 57
Czech (51) 51
Swedish (27) 27
Danish (23) 23
Turkish (22) 22
Arabic (21) 21
Italian (18) 18
Dutch (17) 17
Polish (17) 17
Hindi (13) 13
Hungarian (12) 12
Romanian (10) 10
Ukrainian (10) 10
Finnish (9) 9
Urdu (8) 8
Hebrew (7) 7
Indonesian (7) 7
Croatian (5) 5
Slovenian (5) 5
Estonian (4) 4
Icelandic (4) 4
Lithuanian (4) 4
Serbian (4) 4
Bulgarian (3) 3
Azerbaijani (2) 2
Greek (2) 2
Latin (1) 1
Ndonga (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2007, Project hacking kitaab, ISBN 8125922512, x, 284
Book
2017, ISBN 0691141754, xiv, 373 pages
"The Mathematics of Secrets takes readers on a tour of the mathematics behind cryptography--the science of sending secret messages. Joshua Holden shows how... 
Ciphers | Mathematics | Cryptography | Computer security | Cryptography -- Mathematics
Book
Journal Article
2005, ISBN 0387201092, x, 291
In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in... 
Computer security | Data encryption (Computer science) | General Theory of Computing | Popular Science in Mathematics/Computer Science/Natural Science/Technology | Coding and Information Theory | Computers and Society | Popular Science | Data Encryption
Book
2007, Updated and expanded ed., ISBN 9780262042406, xvii, 472
Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been... 
General Theory of Computing | Electronic intelligence | Engineering Profession | Telecommunication - Political aspects - United States
Book
GEORGETOWN LAW JOURNAL, ISSN 0016-8092, 04/2018, Volume 106, Issue 4, pp. 989 - 1019
The widespread use of encryption has triggered a new step in many criminal investigations: The encryption workaround. We define an encryption workaround as any... 
LAW | Criminal investigation | Remedies | Data encryption | Laws, regulations and rules | Searches and seizures | Methods
Journal Article
Optics and Laser Technology, ISSN 0030-3992, 08/2016, Volume 82, pp. 121 - 133
Most image encryption algorithms based on low-dimensional chaos systems bear security risks and suffer encryption data expansion when adopting nonlinear... 
Hyper-chaotic system | Compressive sensing | Image compression–encryption | Image compression-encryption | PHYSICS, APPLIED | ALGORITHM | INTERFERENCE | CRYPTANALYSIS | OPTICS | MAP | Electrical engineering | Data encryption chips | Algorithms | Data compression | Images | Risk | Nonlinearity | Encryption | Security | Two dimensional | Detection
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 08/2013, Volume 8, Issue 8, pp. 1343 - 1354
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.