X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Book / eBook (1051) 1051
Journal Article (813) 813
Newspaper Article (204) 204
Dissertation (113) 113
Magazine Article (46) 46
Conference Proceeding (31) 31
Journal / eJournal (11) 11
Book Chapter (1) 1
Government Document (1) 1
Publication (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
protección de datos (1187) 1187
computer security (856) 856
computers (839) 839
security measures (805) 805
data protection (683) 683
protection (599) 599
computer science (593) 593
computer networks (592) 592
computer systems (582) 582
cybersecurity (567) 567
cyber security (566) 566
electronic digital computers (566) 566
computer privacy (560) 560
computer system security (559) 559
protection of computer systems (559) 559
security of computer systems (559) 559
data encryption (480) 480
congresses (471) 471
internet (421) 421
cryptology (409) 409
proteccion (398) 398
computer communication networks (395) 395
information systems (395) 395
data encoding (392) 392
encryption of data (392) 392
multi-user (382) 382
computer communication systems (374) 374
management of computing and information systems (346) 346
informatique (342) 342
security (342) 342
seguridad informática (342) 342
computer security congresses (321) 321
datensicherung (317) 317
management information systems (316) 316
general (291) 291
criptografía (289) 289
computersicherheit (286) 286
kongress (281) 281
medidas de seguridad (274) 274
computer software (266) 266
information technology (260) 260
access control (250) 250
computer networks security measures (250) 250
computer network security (245) 245
networking (244) 244
network security, computer (240) 240
security of computer networks (240) 240
algorithm analysis and problem complexity (227) 227
informatics (227) 227
protection, data (226) 226
information storage and retrieval systems (221) 221
kryptologie (217) 217
algorithms (214) 214
systems and data security (213) 213
cryptography (206) 206
redes de ordenadores (204) 204
computers and society (199) 199
aspectos ambientales (197) 197
operating systems (197) 197
personal data protection (195) 195
software, computer (191) 191
sécurité informatique (189) 189
data governance (183) 183
data regulation (183) 183
computers and civilization (181) 181
computadoras (166) 166
redes de computadoras (165) 165
historia (164) 164
law and legislation (160) 160
computer operating systems (157) 157
disk operating systems (157) 157
seguridad (155) 155
privacy, right of (140) 140
security systems (140) 140
kryptoanalyse (137) 137
management (134) 134
hacking (133) 133
rechnernetz (123) 123
sécurité (122) 122
authentifikation (121) 121
investigacion cientifica (120) 120
mesures (120) 120
cryptography congresses (116) 116
cryptographie (115) 115
information systems applications (111) 111
protection de l'information (111) 111
electronic books. -- local (107) 107
kryptosystem (106) 106
electronic data processing (105) 105
privatsphäre (105) 105
proteccion ambiental (105) 105
steganography (105) 105
cryptanalysis (103) 103
secret writing (103) 103
data processing (101) 101
computers access control (97) 97
computer networks congresses. security measures (93) 93
data encryption congresses (92) 92
privacy (92) 92
security measures congresses (91) 91
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Engineering & Comp. Sci. - Stacks (140) 140
UofT at Mississauga - Stacks (75) 75
UTL at Downsview - May be requested (57) 57
Robarts - Stacks (53) 53
Law (Bora Laskin) - Stacks (40) 40
Collection Dvlpm't (Acquisitions) - Vendor file (39) 39
Gerstein Science - Stacks (33) 33
UofT at Scarborough - Stacks (33) 33
Collection Dvlpm't (Acquisitions) - Closed Orders (31) 31
Online Resources - Online (25) 25
Faculty of Information - Stacks (23) 23
St. Michael's College (John M. Kelly) - 2nd Floor (7) 7
Engineering & Comp. Sci. - May be requested in 6-10 wks (4) 4
Faculty of Information - May be requested in 6-10 wks (3) 3
Royal Ontario Museum - Stacks (3) 3
Victoria University E.J. Pratt - Stacks (3) 3
Law (Bora Laskin) - Closed Orders (2) 2
Robarts - Government Pubs (2) 2
Trinity College (John W Graham) - Stacks (2) 2
Aerospace - Stacks (1) 1
Architecture Landscape (Shore + Moffat) - Stacks (1) 1
Astronomy & Astrophysics - Ask at library (1) 1
Business (Joseph L Rotman) - Library use only (1) 1
Earth Sciences (Noranda) - Missing (1) 1
Earth Sciences (Noranda) - Periodical Stacks (1) 1
Engineering & Comp. Sci. - Material is damaged (1) 1
Engineering & Comp. Sci. - Missing (1) 1
Engineering & Comp. Sci. - Periodical Stacks (1) 1
Faculty of Information - Cataloguing (1) 1
OISE - Stacks (1) 1
St. Michael's College (John M. Kelly) - 3rd Floor (1) 1
UofT Schools - Stacks (1) 1
UofT at Mississauga - Periodical Stacks (1) 1
UofT at Mississauga - Reference (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (1257) 1257
Spanish (1056) 1056
Portuguese (23) 23
German (13) 13
Japanese (12) 12
Catalan (10) 10
Czech (6) 6
French (6) 6
Arabic (4) 4
Chinese (2) 2
Galician (2) 2
Dutch (1) 1
Italian (1) 1
Korean (1) 1
Norwegian (1) 1
Russian (1) 1
Turkish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2005, 2nd ed., Morgan Kaufmann series in data management systems., ISBN 9780120884070, xxxi, 525
Book
2007, ISBN 0471782459, xxvi, 700
Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been... 
Technology | Telecommunications | Prevention | Phishing | Identity theft | Computer security
Book
2010, Digital research in the arts and humanities, ISBN 0754675688, xx, 183 p., [12] p. of plates
Book
2011, Data mining and knowledge discovery series, ISBN 1420091484, xxxii, 344
Book
2003, 1, ISBN 9780849314605, xxiv, 516
The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be... 
Data mining | General Theory of Computing | Business intelligence | Terrorism | Web databases | Prevention | Databases
Book
1997, Colección Monografías Aranzadi, ISBN 8481935158, Volume 53, 375
Book
2016, ISBN 1612056164, x, 273
Cloud computing and big data are arguably the most significant forces in information technology today. In the wake of revelations about National Security... 
Cloud computing | Big data | Social aspects | Privacy, Right of | International Relations | Introductory Politics
Book
2008, 2nd ed., The Morgan Kaufmann series in multimedia information and systems, ISBN 0123725852, xxviii, 593
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to... 
Computer security | Data protection | Digital watermarking | Applications of Computing
Book
IEEE transactions on information forensics and security, ISSN 1556-6021, 2017, Volume 12, Issue 6, pp. 1418 - 1429
Journal Article
2007, 6th ed., ISBN 9781420067101, Volume 2, v.
Book
2001, Polemics, ISBN 0813336694, x, 239
Book
2008, ISBN 9780521873710, Volume 9780521873710, xvii, 485
This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their... 
Security measures | Computer networks | Wireless communication systems | Wireless communication systems - Security measures
Book
2012, ISBN 0300125437, xi, 337
The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy.... 
Information networks | Copyright and electronic data processing | Internet | Social aspects | Law and legislation | Data protection
Book
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.