Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
My Library Account
Seneca Libraries
LibGuides
subjectguides
Computer Science and IT
Security
Search this Guide
Search
Computer Science and IT: Security
Home
Books
Databases & Journals
Video Resources
Project Management
Security
Standards
Tutorials
Public Websites That Focus on Security
Canadian Security Intelligence Service
National Cybercrime Coordination Unit
Canadian Centre for Cyber Security
Canadian Cyber Threat Exchange
Canada Cyber Security Safe
Canadian Internet Registration Authority
CIRA Canadian Shield
Free public DNS
List of 500 Cybersecurity Companies in Canada
Canadian Centre for Cyber Security Learning Hub
Security Certification Road Map
eBooks
Anomaly Detection
Business Enterprises--Computer Networks--Security Measures
Cloud Computing--Security Measures
Computer Hacking
Computer Networks--Monitoring
Computer Networks--Security Measures
Computer Security
Computer Viruses
Crime, Law and Justice--Crime--Computer Crime
Cryptography
Cyberattacks
Cybercrime
Cybersecurity
Cyberterrorism
Data Breaches
Data Encryption
Denial of Service Attacks
Hackers
Identity Theft
Malware
Network Forensics
Personal Data
Phishing Attack
Privacy
Security Measures
Social Engineering
Threat Landscape
Journals and Magazines
ACM Transactions on Security
Computer Law and Security Review
CSO Online
Cyber Crime Magazine
Cyber Wire
Dark Reading
IEEE Security and Privacy
IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Information Forensics and Security
IET Information Security
Information and Computer Security
International Journal of Information Security
Journal of Computer Security
Journal of Cryptology
Journal of Cybersecurity
Journal of Information Security and Applications
Computers and Security
Information and Computer Security
Cryptologia
ACM Transactions on Information and System Security
PODCASTS and BLOGS
Daily Information Security Podcast ('Stormcast')
Krebs on Security
Threat Post
<<
Previous:
Project Management
Next:
Standards >>
This work is licensed under a
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License
.