X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (741) 741
Magazine Article (435) 435
Journal Article (230) 230
Trade Publication Article (40) 40
Book / eBook (11) 11
Publication (5) 5
Book Chapter (2) 2
Book Review (2) 2
Data Set (1) 1
Dissertation (1) 1
Reference (1) 1
Streaming Audio (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
computer software industry (93) 93
usage (74) 74
international (60) 60
management (60) 60
product development (47) 47
software (47) 47
services (45) 45
computer industry (42) 42
small business (41) 41
computer security (40) 40
online services (38) 38
internet (37) 37
information technology (36) 36
forecasts and trends (35) 35
social networks (34) 34
startups (33) 33
product introduction (31) 31
software industry (30) 30
technological planning (30) 30
computer networks (29) 29
innovations (28) 28
product information (28) 28
standards (27) 27
systems design (27) 27
planning (26) 26
electronic commerce (25) 25
enterprisewide computing (25) 25
entrepreneurs (25) 25
business community (24) 24
network security (24) 24
telecommunications services industry (24) 24
analysis (23) 23
marketing (23) 23
safety and security measures (23) 23
computer & video games (20) 20
value added resellers (20) 20
market strategy (18) 18
operating systems (18) 18
web sites (18) 18
technological change (17) 17
business conditions (16) 16
business incubators (16) 16
information management (16) 16
semiconductor industry (16) 16
venture capital (16) 16
microprocessors (15) 15
broadband (14) 14
corporate profiles (14) 14
customer services (14) 14
data security (14) 14
venture capital companies (14) 14
computers (13) 13
data encryption (13) 13
wireless networks (13) 13
computer viruses (12) 12
digital currencies (12) 12
entrepreneurship (12) 12
high definition television--hdtv (12) 12
internet service providers (12) 12
product lines (12) 12
software packages (12) 12
stock exchanges (12) 12
strategic management (12) 12
world wide web (12) 12
blockchain (11) 11
cellular telephones (11) 11
competition (11) 11
computer architecture (11) 11
computer network equipment industry (11) 11
data integrity (11) 11
design (11) 11
design and construction (11) 11
electronic mail systems (11) 11
institutional investments (11) 11
interoperability (11) 11
investments (11) 11
manycompanies (11) 11
network management systems (11) 11
technology application (11) 11
barter (10) 10
computer services industry (10) 10
digital imaging (10) 10
economic development (10) 10
networks (10) 10
petroleum industry (10) 10
security (10) 10
tax rates (10) 10
taxable income (10) 10
telecommunications equipment industry (10) 10
virtualization (10) 10
angel investors (9) 9
books (9) 9
computer science, information systems (9) 9
digital audio players (9) 9
games (9) 9
information networks (9) 9
internet telephony (9) 9
natural gas (9) 9
open source software (9) 9
retail stores (9) 9
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (8) 8
Collection Dvlpm't (Acquisitions) - Vendor file (2) 2
Music - Stacks (1) 1
St. Michael's College (John M. Kelly) - 2nd Floor (1) 1
Trinity College (John W Graham) - Reference (1) 1
Trinity College (John W Graham) - Stacks (1) 1
UTL at Downsview - May be requested (1) 1
Victoria University E.J. Pratt - Searching (1) 1
Victoria University E.J. Pratt - Stacks (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Computer Fraud & Security, ISSN 1361-3723, 11/2013, Volume 2013, Issue 11, pp. 5 - 8
The Bitcoin network was launched in 2009 by the mysterious Satoshi Nakamoto, a developer who worked extensively on the project but only interacted with people... 
Journal Article
Network Security, ISSN 1353-4858, 04/2014, Volume 2014, Issue 4, pp. 14 - 17
The dark web is a secretive, anonymous place where shadowy users access hidden services. It can be used for good or bad – but can it be cracked? And if so,... 
World Wide Web | Systems design | Computer security | Crime | Privacy | Networks | Roads | Illegal | Stores | Security | Online | Technology utilization
Journal Article
Network Security, ISSN 1353-4858, 10/2014, Volume 2014, Issue 10, pp. 10 - 14
Anonymity and privacy are two separate concepts that are often confused. It is a common problem, made worse by the fact that they are often connected and... 
Privacy | Anonymity | Network security | Internet | Networks | Tasks | Security | Online
Journal Article
Network Security, ISSN 1353-4858, 06/2014, Volume 2014, Issue 6, pp. 8 - 12
We never like to think that criminals are above the law, but there are always some that seem hard to bring to justice. Mob bosses who seem unassailable, or... 
Phishing | Studies | Web hosting | Offshore | Law | Analysis | Internet crime | Bosses | Malware | Offshore engineering | Online | Corporate law | Legal actions
Journal Article
Network Security, ISSN 1353-4858, 03/2014, Volume 2014, Issue 3, pp. 13 - 16
Email has always been insecure. When it was first developed, openness and collaboration were necessary just to develop the nascent networks that eventually... 
Electronic mail systems | Computer security | International | Privacy | Networks | Email | Risk | Electronic mail | Internet | Security
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 11/2015, Volume 2015, Issue 11, pp. 5 - 8
It can be difficult for people to keep a secret at the best of times, and this is particularly true in the world of cyber-security. The whole industry rests on... 
Journal Article
Network Security, ISSN 1353-4858, 10/2012, Volume 2012, Issue 10, pp. 15 - 17
Facebook is one of the Internet's biggest success stories. Started in 2004, the site now has over 900 million users. No wonder it has been such a target for... 
Social aspects | Online social networks | Network security | Social networks | Spamming | Web services | Networks | Spreading | On-line systems | Software | Internet | Security | Computer programs
Journal Article
Network Security, ISSN 1353-4858, 07/2013, Volume 2013, Issue 7, pp. 9 - 12
February 2013 was a ground-breaking month in computer security. A new Linux distribution was launched, called Active Defense Harbinger Distribution (ADHD). We... 
Studies | Network security | Security management | Linux | Computer security | UNIX (operating system) | Launching | Damage | Online | Computer information security | Windows (computer programs) | Defence | Strikes
Journal Article
Network Security, ISSN 1353-4858, 01/2013, Volume 2013, Issue 1, pp. 5 - 7
One of the biggest security problems for any system lies in software bugs. If software doesn't do what we expect of it – or does something that we don't expect... 
Software | Computer security
Journal Article
Network Security, ISSN 1353-4858, 08/2012, Volume 2012, Issue 8, pp. 12 - 15
In the early days of the Internet, domain theft was a problem. But these days, it's a legitimate practice, designed to make the network a safer place.... 
Sinkholes | Network security | Law enforcement | Ethics | Networks | Communities | On-line systems | Internet | Security | Online | Computer programs
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 2011, Volume 2011, Issue 10, pp. 5 - 8
Scott McClellan didn't have a very good May. The chief technologist and interim vice-president of engineering for HP's fledgling cloud services business had... 
Data mining | Cloud computing | Business networks (Social groups)
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 04/2012, Volume 2012, Issue 4, pp. 11 - 14
Are we at risk of a system meltdown of Hollywood proportions? A recent presentation highlighting critical vulnerabilities in some of our most popular... 
Control systems | Control equipment industry
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 06/2013, Volume 2013, Issue 6, pp. 15 - 18
What is information warfare? Many articles have used the term in the broadest sense to discuss any conflict in which data is involved, including, for example,... 
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 02/2013, Volume 2013, Issue 2, pp. 11 - 15
We live in an increasingly uncertain world. Organisations are having to cope with unpredictable events such as extreme weather incidents, and geopolitical... 
Data security
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 10/2012, Volume 2012, Issue 10, pp. 12 - 16
2011 was a nasty year for advocates of digital certificates based on Public Key Infrastructure (PKI). Several breaches shook the industry's confidence in a... 
Data security
Journal Article
Network Security, ISSN 1353-4858, 01/2013, Volume 2013, Issue 1, pp. 5 - 7
One of the biggest security problems for any system lies in software bugs. If software doesn't do what we expect of it a or does something that we don't expect... 
Networks | Software | Security | Program verification (computers) | Computer programs
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 01/2012, Volume 2012, Issue 1, pp. 12 - 14
How do you steal 210,000 customer account records from Citigroup without hacking? Apparently, it's as simple as changing a URL parameter. That is how hackers... 
Web sites
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 05/2012, Volume 2012, Issue 5, pp. 7 - 10
Peter Muhlberger was happy when he bought home his digital camera. He was looking forward to taking high-quality digital images to show his family and friends.... 
Spyware
Journal Article
Network Security, ISSN 1353-4858, 2011, Volume 2011, Issue 2, pp. 9 - 12
Wireless networking makes life easy for those that use it, but unless properly configured, it is also remarkably easy to attack. Security firm SecPoint has... 
Network security | Hackers | Wireless networks | Authentication protocols | UNIX (operating system) | Networks | Penetration | Packages | Passwords | On-line systems | Management | Protocol (computers) | Security
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 02/2012, Volume 2012, Issue 2, pp. 11 - 15
FBI agent Robert Mueller sees borders as obstacles. Speaking at the RSA conference in 2010, the cybercrime expert added that criminals see them as... 
Computer crimes
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.