X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (2043) 2043
Journal Article (1680) 1680
Magazine Article (279) 279
Book Chapter (267) 267
Book / eBook (264) 264
Publication (87) 87
Newspaper Article (58) 58
Book Review (50) 50
Dissertation (40) 40
Government Document (40) 40
Trade Publication Article (26) 26
Paper (7) 7
Web Resource (7) 7
Journal / eJournal (5) 5
Streaming Video (4) 4
Video Recording (2) 2
Data Set (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
computer hacking (2774) 2774
hacking (1146) 1146
internet (816) 816
computer security (646) 646
security (525) 525
computer crime (515) 515
protection (409) 409
information security (402) 402
computer networks (377) 377
computers (345) 345
computer science (344) 344
data security (320) 320
cybersecurity (315) 315
security measures (275) 275
cryptography (253) 253
intrusion detection (224) 224
hackers (223) 223
privacy (212) 212
computer science, software engineering (203) 203
computer systems (202) 202
information technology (191) 191
cyber security (189) 189
authentication (188) 188
computer information security (182) 182
software (182) 182
engineering, electrical & electronic (180) 180
malware (172) 172
electronic books (169) 169
ip networks (169) 169
computer science, information systems (168) 168
network security (165) 165
protocols (152) 152
hardware (147) 147
law (147) 147
servers (146) 146
computer hackers (144) 144
databases (144) 144
technology (142) 142
electronic digital computers (136) 136
testing (136) 136
computer crimes (134) 134
educational institutions (134) 134
humans (134) 134
data protection (133) 133
computer privacy (130) 130
computer viruses (130) 130
computer system security (128) 128
protection of computer systems (128) 128
security of computer systems (128) 128
application software (125) 125
computer software (121) 121
computer science, hardware & architecture (119) 119
monitoring (118) 118
general (116) 116
telecommunications (116) 116
operating systems (115) 115
analysis (114) 114
business (113) 113
government (113) 113
conferences (107) 107
applied sciences (106) 106
computer operations (105) 105
electronic mail (105) 105
prevention (105) 105
security systems (102) 102
personal computers (99) 99
ethics (96) 96
management (95) 95
communication system security (94) 94
encryption (94) 94
companies (93) 93
networks (93) 93
cybercrime (91) 91
history (91) 91
access control (90) 90
costs (90) 90
education (90) 90
information systems (90) 90
networking (89) 89
safety and security measures (88) 88
cyberspace (87) 87
penetration testing (85) 85
ethical hacking (84) 84
computer programs (82) 82
data mining (82) 82
network servers (80) 80
control systems (79) 79
political science (78) 78
computer network security (77) 77
index medicus (76) 76
national security (76) 76
philosophy (76) 76
cybercrimes (75) 75
p-hacking (75) 75
communications technology (74) 74
crime (73) 73
telecommunication traffic (73) 73
terrorism (73) 73
games (72) 72
ian hacking (72) 72
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (36) 36
UofT at Mississauga - Stacks (30) 30
Engineering & Comp. Sci. - Stacks (25) 25
UofT at Scarborough - Stacks (17) 17
St. Michael's College (John M. Kelly) - 2nd Floor (15) 15
Collection Dvlpm't (Acquisitions) - Vendor file (10) 10
Online Resources - Online (9) 9
UTL at Downsview - May be requested (8) 8
UofT Schools - Stacks (6) 6
Collection Dvlpm't (Acquisitions) - Closed Orders (5) 5
Faculty of Information - Stacks (5) 5
Trinity College (John W Graham) - Stacks (5) 5
Gerstein Science - Stacks (4) 4
Engineering & Comp. Sci. - Periodical Stacks (3) 3
New College (Ivey) - Stacks (3) 3
Architecture Landscape (Shore + Moffat) - Stacks (2) 2
Criminology - Stacks (2) 2
Law (Bora Laskin) - Stacks (2) 2
Media Commons - Audio Visual (2) 2
Victoria University E.J. Pratt - Stacks (2) 2
Aerospace - Stacks (1) 1
Engineering & Comp. Sci. - Material is damaged (1) 1
Engineering & Comp. Sci. - May be requested in 6-10 wks (1) 1
Engineering & Comp. Sci. - Missing (1) 1
Music - Stacks (1) 1
Physics - Stacks (1) 1
Trinity College (John W Graham) - Reference (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (4473) 4473
Korean (26) 26
German (24) 24
Spanish (19) 19
French (14) 14
Japanese (12) 12
Chinese (6) 6
Arabic (3) 3
Portuguese (3) 3
Dutch (2) 2
Italian (2) 2
Lithuanian (2) 2
Polish (2) 2
Russian (2) 2
Swedish (2) 2
Turkish (2) 2
Afrikaans (1) 1
Czech (1) 1
Finnish (1) 1
Persian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2018, ISBN 9781107566866, xx, 246 pages
Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have... 
Hackers | Technology and international relations | Cyberterrorism | Hacking | Internet and international relations | Cyberspace
Book
2014, First American edition., ISBN 9780865478817, xvii, 430 pages
"The definitive book on how the News of the World phone-hacking scandal reached the highest echelons of power in the government, security, and the media in the... 
Newspapers | Corrupt practices | Journalism | News of the World Phone Hacking Scandal, Great Britain, 2000-2012 | Murdoch, Rupert, 1931
Book
04/2017, ISBN 1119396212
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on... 
Hacking
eBook
Revue de science criminelle et de droit pénal comparé, ISSN 0035-1733, 07/2012, Volume 3, pp. 603 - 616
Journal Article
2017, Genius, ISBN 1250045827, Volume 2, 278 pages
Three young geniuses from around the globe hatch a plot to trick a vicious warlord, infiltrate a mastermind's organization, protect their families, and save... 
Friendship | Corruption | Technology | Genius | Hacking | Science fiction
Book
2016, First edition., ISBN 9781610394154, ix, 306 pages
"The internet today connects roughly 2.7 billion people around the world, and booming interest in the "internet of things" could result in 75 billion devices... 
Technology and international relations | Cyberterrorism | Internet in espionage | Cyberspace | Internet and international relations | Hacking | Political aspects
Book
2017, ISBN 1119396212
Web Resource
New media and society, ISSN 1461-4448, 10/2005, Volume 7, Issue 5, pp. 595 - 598
Journal Article
2017, The changing face of war, ISBN 9781440835643, x, 290 pages
"As a society that has revered learning and education for millennia, China has a long history of valuing information. As early as the 1980s, the People's... 
Information warfare | Cyberspace operations (Military science)
Book
George Washington Law Review, ISSN 0016-8076, 12/2016, Volume 84, Issue 6, pp. 1703 - 1723
Whenever a legislature creates a technology-specific crime, it faces a number of challenges. First, there is a risk that the new statute will merely duplicate... 
HACKING | LAW
Journal Article
Annual Review of Psychology, ISSN 0066-4308, 1/2018, Volume 69, Issue 1, pp. 511 - 534
Journal Article
2017, First edition., ISBN 9780316478519, xx, 268 pages
"Donna Brazile's explosive book is the first insider account of the Russian hacking of the DNC and the missteps by the Clinton campaign and Obama... 
Brazile, Donna, 1959 | Clinton, Hillary Rodham | Democratic National Committee (U.S.) | Trump, Donald, 1946 | Political campaigns | History | Election | Presidents
Book
12/2017, 1, Law, science and society, ISBN 0367264382, 287
eBook
2010, 1., Urban Studies, ISBN 9783837615364
Book
06/2012
Quantum key distribution (QKD) can provide unconditional security based on the fundamental laws of quantum physics. Unfortunately, real-life implementations of... 
0544 | Quantum Hacking | Quantum random number generator
Dissertation
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.