X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (945) 945
Book / eBook (890) 890
Journal Article (785) 785
Publication (122) 122
Magazine Article (81) 81
Dissertation (53) 53
Book Chapter (43) 43
Paper (4) 4
Journal / eJournal (2) 2
Technical Report (1) 1
Trade Publication Article (1) 1
Web Resource (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
datensicherung (2524) 2524
computer science (913) 913
computer security (895) 895
electronic books (840) 840
computers (741) 741
security measures (731) 731
computer networks (672) 672
data protection (631) 631
computersicherheit (599) 599
congresses (595) 595
kongress (579) 579
protection (565) 565
computer communication networks (563) 563
data encryption (562) 562
computer systems (492) 492
cyber security (467) 467
information systems (467) 467
cybersecurity (466) 466
electronic digital computers (463) 463
computer privacy (457) 457
computer system security (453) 453
protection of computer systems (453) 453
security of computer systems (453) 453
computer communication systems (447) 447
informatique (414) 414
management of computing and information systems (399) 399
cryptology (398) 398
datensicherheit (393) 393
multi-user (375) 375
internet (361) 361
data encoding (355) 355
encryption of data (355) 355
management information systems (350) 350
systems and data security (339) 339
security (338) 338
rechnernetz (335) 335
datenschutz (332) 332
access control (326) 326
information storage and retrieval systems (323) 323
protección de datos (317) 317
information technology (304) 304
seguridad informática (284) 284
computer security congresses (278) 278
computer software (271) 271
kryptoanalyse (257) 257
kryptologie (255) 255
computers and society (254) 254
algorithm analysis and problem complexity (245) 245
computer network security (239) 239
data security (239) 239
informatics (239) 239
algorithms (238) 238
information systems applications (238) 238
network security, computer (237) 237
security of computer networks (237) 237
zugriffskontrolle (232) 232
medidas de seguridad (230) 230
computers and civilization (225) 225
computer networks security measures (221) 221
cryptography (221) 221
operating systems (220) 220
privatsphäre (214) 214
privacy (213) 213
authentifikation (203) 203
geheimhaltung (201) 201
management (199) 199
telecommunications (192) 192
software engineering (191) 191
kryptosystem (188) 188
general (171) 171
protection, data (170) 170
sécurité informatique (169) 169
software, computer (161) 161
redes de computadoras (159) 159
information storage and retrieval (157) 157
computer networks congresses. security measures (154) 154
information security (154) 154
informationssystem (150) 150
engineering, electrical & electronic (144) 144
criptografía (139) 139
engineering & applied sciences (138) 138
mesures (136) 136
personal data protection (136) 136
verschlüsselung (135) 135
networking (131) 131
sécurité (131) 131
application software (130) 130
data governance (130) 130
data regulation (130) 130
database management (126) 126
data processing (119) 119
computer operating systems (116) 116
disk operating systems (116) 116
cloud computing (113) 113
sicherheit (113) 113
computadoras (112) 112
artificial intelligence (108) 108
computer-based information systems (108) 108
electronic commerce (107) 107
redes de ordenadores (106) 106
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Engineering & Comp. Sci. - Stacks (156) 156
UTL at Downsview - May be requested (51) 51
Gerstein Science - Stacks (43) 43
UofT at Mississauga - Stacks (31) 31
Robarts - Stacks (21) 21
UofT at Scarborough - Stacks (21) 21
Collection Dvlpm't (Acquisitions) - Vendor file (20) 20
Collection Dvlpm't (Acquisitions) - Closed Orders (17) 17
Online Resources - Online (10) 10
Faculty of Information - Stacks (8) 8
Law (Bora Laskin) - Stacks (8) 8
St. Michael's College (John M. Kelly) - 2nd Floor (3) 3
Trinity College (John W Graham) - Stacks (3) 3
Engineering & Comp. Sci. - May be requested in 6-10 wks (2) 2
Faculty of Information - May be requested in 6-10 wks (2) 2
Astronomy & Astrophysics - Ask at library (1) 1
Business (Joseph L Rotman) - Stacks (1) 1
Collection Dvlpm't (Acquisitions) - Cancelled Order (1) 1
Engineering & Comp. Sci. - Missing (1) 1
Engineering & Comp. Sci. - Periodical Stacks (1) 1
Mathematical Sciences - Stacks (1) 1
Robarts - Storage (1) 1
St. Michael's College (John M. Kelly) - Circulation Desk (1) 1
UofT at Mississauga - May be requested (1) 1
UofT at Mississauga - Reference (1) 1
Victoria University E.J. Pratt - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (2495) 2495
German (137) 137
Spanish (25) 25
Japanese (22) 22
Czech (7) 7
Chinese (3) 3
Italian (2) 2
Arabic (1) 1
French (1) 1
Korean (1) 1
Norwegian (1) 1
Portuguese (1) 1
Turkish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2016, ISBN 9780190665012, vii, 290 pages
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this... 
Networking | COMPUTERS | General | Computer networks | Internet | Security | Computer security | Security measures | International Relations | Cyber attacks | Cybersecurity dilemma | Snowden | Counterintelligence | Cybersecurity | Hacking | International security | Security dilemma | Cyber operations
Book
2017, MIT connections science & engineering, ISBN 9780262535373, 491 pages
Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives.Ongoing cyberattacks, hacks,... 
Security measures | Computer networks | Internet | Communication, Networking and Broadcast Technologies | Components, Circuits, Devices and Systems | Computing and Processing
Book
Network Security, ISSN 1353-4858, 02/2019, Volume 2019, Issue 2, pp. 14 - 16
The General Data Protection Regulation (GDPR) is now in force and it's been a while since companies were bombarded with scaremongering messages urging them to... 
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 05/2017, Volume 2017, Issue 5, pp. 9 - 13
As our dependency on technology steadily increases, so do the trails of information that we leave behind. You only need to look at recent scandals in the press... 
Journal Article
2008, ISBN 9780300124873, vi, 342
This extraordinary book explains the engine that has catapulted the Internet from backwater to ubiquityand reveals that it is sputtering precisely because of... 
security | sociological aspects | Internet (Computer network) | computers | Social aspects | Security measures | Internet | Communication and technology
Book
2018, First edition., ISBN 1250114578, xii, 302 pages
Paul Vigna and Michael J. Casey demystify the Internet's next big thing - the Blockchain - and explain why it can restore personal control over our data,... 
Blockchains (Databases) | Data encryption (Computer science) | Database security | Bitcoin | Electronic funds transfers
Book
Network Security, ISSN 1353-4858, 11/2017, Volume 2017, Issue 11, pp. 7 - 8
In the rush to get new apps to market before the competition, start-ups are cutting corners. Yet in an era of escalating cyber-security threats and punitive... 
Journal Article
2010, ISBN 1439806802, xxxviii, 301
Book
Network Security, ISSN 1353-4858, 12/2016, Volume 2016, Issue 12, pp. 10 - 15
Many companies are now in the data business, whether they know it or not. Popular clichés about data turn on words such as ‘lifeblood’ or ‘crown jewels’,... 
Journal Article
Journal of Physics: Conference Series, ISSN 1742-6588, 03/2018, Volume 978, Issue 1, p. 12037
Conference Proceeding
2008, ISBN 9780521873710, Volume 9780521873710, xvii, 485
This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their... 
Security measures | Computer networks | Wireless communication systems
Book
Nature Photonics, ISSN 1749-4885, 05/2010, Volume 4, Issue 5, pp. 297 - 301
Although silicon has dominated solid-state electronics for more than four decades, a variety of other materials are used in photonic devices to expand the... 
TRANSISTORS | PHYSICS, APPLIED | PHOTODIODE | OPTICS | LAYER | SILICON | Wavelengths | Graphene | Electronics | Photodetectors | Devices | Carbon | Channels | Photonics
Journal Article
Journal of Physics: Conference Series, ISSN 1742-6588, 03/2018, Volume 978, Issue 1, p. 12042
Conference Proceeding
IOP Conference Series: Materials Science and Engineering, ISSN 1757-8981, 05/2018, Volume 351, Issue 1, p. 12017
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2017, Volume 10489, pp. 350 - 360
Conference Proceeding
IOP Conference Series: Materials Science and Engineering, ISSN 1757-8981, 12/2017, Volume 263, Issue 4, p. 42063
Conference Proceeding
2016, 1, Routledge studies in the growth economies of Asia, ISBN 9781315675930, Volume 129, xv, 178
Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely monetary gain,... 
Financial institutions | Risk management | Security measures | Financial services industry | Data protection | Industry & industrial studies | Information Technology Law | Data Protection | Finance | Asian Studies (General) | Computer Fraud | Privacy & Data Protection | Risk Management | Hacking & Viruses
Book
2016, ISBN 148224327X, xxx, 574 pages : illustrations
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining... 
Prevention | Privacy, Right of | Web usage mining | Data protection | Computer crimes | Security measures | Online social networks | Software Engineering & Systems Development | Internet & Multimedia | IT Security
Book
2003, IFIP Advances in Information and Communication Technology, ISBN 1402074735, Volume 124, x, 226
Integrity and Internal Control in Information Systems V represents a continuation of the dialogue between researchers, information security specialists,... 
Information resources management | Congresses | Accounting | Accounting/Auditing | Information Systems | Theory of Computation | Information Systems Applications (incl. Internet) | Management of Computing and Information Systems | Information theory
Book
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.