X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (2038) 2038
Journal Article (1670) 1670
Magazine Article (279) 279
Book Chapter (270) 270
Book / eBook (188) 188
Publication (87) 87
Newspaper Article (58) 58
Book Review (50) 50
Dissertation (41) 41
Government Document (40) 40
Trade Publication Article (26) 26
Paper (7) 7
Web Resource (7) 7
Streaming Video (4) 4
Video Recording (2) 2
Data Set (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
computer hacking (2771) 2771
hacking (1059) 1059
internet (765) 765
computer security (564) 564
computer crime (513) 513
security (475) 475
information security (396) 396
protection (329) 329
computer networks (322) 322
computer science (319) 319
data security (316) 316
computers (264) 264
cryptography (246) 246
cybersecurity (236) 236
intrusion detection (222) 222
hackers (214) 214
privacy (210) 210
computer science, software engineering (203) 203
security measures (197) 197
authentication (187) 187
computer information security (180) 180
software (180) 180
engineering, electrical & electronic (179) 179
information technology (174) 174
ip networks (169) 169
computer science, information systems (168) 168
malware (167) 167
network security (161) 161
protocols (152) 152
servers (146) 146
hardware (145) 145
law (143) 143
technology (141) 141
databases (139) 139
computer hackers (137) 137
testing (134) 134
educational institutions (133) 133
humans (131) 131
computer viruses (124) 124
application software (123) 123
computer systems (123) 123
computer crimes (120) 120
computer science, hardware & architecture (119) 119
monitoring (117) 117
computer software (115) 115
analysis (114) 114
telecommunications (114) 114
government (113) 113
business (112) 112
operating systems (112) 112
cyber security (110) 110
applied sciences (109) 109
computer operations (108) 108
conferences (107) 107
electronic mail (105) 105
electronic books (102) 102
personal computers (98) 98
prevention (98) 98
ethics (97) 97
communication system security (94) 94
encryption (94) 94
networks (93) 93
companies (92) 92
history (92) 92
cybercrime (91) 91
education (91) 91
costs (90) 90
safety and security measures (88) 88
cyberspace (87) 87
information systems (86) 86
management (85) 85
ethical hacking (83) 83
computer programs (81) 81
data mining (81) 81
access control (80) 80
network servers (80) 80
penetration testing (80) 80
political science (80) 80
control systems (79) 79
national security (77) 77
philosophy (77) 77
communications technology (76) 76
computer engineering (73) 73
p-hacking (73) 73
telecommunication traffic (73) 73
terrorism (73) 73
games (72) 72
ian hacking (72) 72
index medicus (72) 72
web server (72) 72
computer technology (71) 71
research (71) 71
cybercrimes (70) 70
crime (67) 67
cloud computing (66) 66
computational modeling (66) 66
general (66) 66
computer architecture (64) 64
risk management (64) 64
communication systems (63) 63
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (36) 36
UofT at Mississauga - Stacks (21) 21
Engineering & Comp. Sci. - Stacks (19) 19
UofT at Scarborough - Stacks (16) 16
St. Michael's College (John M. Kelly) - 2nd Floor (15) 15
Online Resources - Online (9) 9
Collection Dvlpm't (Acquisitions) - Vendor file (8) 8
UofT Schools - Stacks (6) 6
Collection Dvlpm't (Acquisitions) - Closed Orders (5) 5
Trinity College (John W Graham) - Stacks (5) 5
UTL at Downsview - May be requested (5) 5
Gerstein Science - Stacks (4) 4
Faculty of Information - Stacks (3) 3
New College (Ivey) - Stacks (3) 3
Architecture Landscape (Shore + Moffat) - Stacks (2) 2
Criminology - Stacks (2) 2
Law (Bora Laskin) - Stacks (2) 2
Media Commons - Audio Visual (2) 2
Victoria University E.J. Pratt - Stacks (2) 2
Engineering & Comp. Sci. - Material is damaged (1) 1
Engineering & Comp. Sci. - Missing (1) 1
Music - Stacks (1) 1
Physics - Stacks (1) 1
Trinity College (John W Graham) - Reference (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (4380) 4380
Korean (26) 26
German (22) 22
Spanish (18) 18
French (14) 14
Japanese (9) 9
Chinese (6) 6
Portuguese (4) 4
Arabic (3) 3
Dutch (2) 2
Italian (2) 2
Lithuanian (2) 2
Polish (2) 2
Swedish (2) 2
Turkish (2) 2
Afrikaans (1) 1
Finnish (1) 1
Persian (1) 1
Russian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2018, ISBN 9781107566866, xx, 246 pages
Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have... 
Hackers | Technology and international relations | Cyberterrorism | Hacking | Internet and international relations | Cyberspace
Book
2014, First American edition., ISBN 9780865478817, xvii, 430 pages
"The definitive book on how the News of the World phone-hacking scandal reached the highest echelons of power in the government, security, and the media in the... 
Newspapers | Corrupt practices | Journalism | News of the World Phone Hacking Scandal, Great Britain, 2000-2012 | Murdoch, Rupert, 1931
Book
04/2017, ISBN 1119396212
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on... 
Hacking
eBook
Revue de science criminelle et de droit pénal comparé, ISSN 0035-1733, 07/2012, Volume 3, pp. 603 - 616
Journal Article
2017, Genius, ISBN 1250045827, Volume 2, 278 pages
Three young geniuses from around the globe hatch a plot to trick a vicious warlord, infiltrate a mastermind's organization, protect their families, and save... 
Friendship | Corruption | Technology | Genius | Hacking | Science fiction
Book
2016, First edition., ISBN 9781610394154, ix, 306 pages
"The internet today connects roughly 2.7 billion people around the world, and booming interest in the "internet of things" could result in 75 billion devices... 
Technology and international relations | Cyberterrorism | Internet in espionage | Cyberspace | Internet and international relations | Hacking | Political aspects
Book
2017, ISBN 1119396212
Web Resource
New media and society, ISSN 1461-4448, 10/2005, Volume 7, Issue 5, pp. 595 - 598
Journal Article
2017, The changing face of war, ISBN 9781440835643, x, 290 pages
"As a society that has revered learning and education for millennia, China has a long history of valuing information. As early as the 1980s, the People's... 
Information warfare | Cyberspace operations (Military science)
Book
George Washington Law Review, ISSN 0016-8076, 12/2016, Volume 84, Issue 6, pp. 1703 - 1723
Whenever a legislature creates a technology-specific crime, it faces a number of challenges. First, there is a risk that the new statute will merely duplicate... 
HACKING | LAW
Journal Article
12/2017, 1, Law, science and society, ISBN 0367264382, 287
eBook
2017, First edition., ISBN 9780316478519, xx, 268 pages
"Donna Brazile's explosive book is the first insider account of the Russian hacking of the DNC and the missteps by the Clinton campaign and Obama... 
Brazile, Donna, 1959 | Clinton, Hillary Rodham | Democratic National Committee (U.S.) | Trump, Donald, 1946 | Political campaigns | History | Election | Presidents
Book
2010, 1., Urban Studies, ISBN 9783837615364
Book
06/2012
Quantum key distribution (QKD) can provide unconditional security based on the fundamental laws of quantum physics. Unfortunately, real-life implementations of... 
0544 | Quantum Hacking | Quantum random number generator
Dissertation
International studies in the philosophy of science, ISSN 0269-8595, 03/2016, Volume 30, Issue 1, pp. 69 - 84
Ian Hacking has defined himself as a philosopher in the analytic tradition. However, he has also recognized the profound influence that Michel Foucault had on... 
Hacking, Ian
Journal Article
2016, Alternative criminology series, ISBN 9781479869718, xv, 285 pages
Public discourse, from pop culture to political rhetoric, portrays the figure of the hacker distinctly: a deceptive, digital villain. But what do we actually... 
Economic aspects | Hackers | Social aspects | Computer crimes
Book
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.