X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (9045) 9045
Newsletter (3178) 3178
Journal Article (2681) 2681
Magazine Article (2474) 2474
Trade Publication Article (935) 935
Conference Proceeding (157) 157
Transcript (120) 120
Publication (92) 92
Book Review (68) 68
Government Document (46) 46
Report (42) 42
Streaming Video (32) 32
Web Resource (28) 28
Book / eBook (23) 23
Book Chapter (21) 21
Dissertation (14) 14
Data Set (1) 1
Paper (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
spyware (18081) 18081
computer software industry (2618) 2618
computer viruses (2381) 2381
safety and security measures (2050) 2050
patents (1682) 1682
computer security (1527) 1527
internet (1398) 1398
computer crimes (1310) 1310
cyberterrorism (1288) 1288
network security (1282) 1282
methods (1256) 1256
intellectual property (1243) 1243
reports (1195) 1195
data security (1034) 1034
malware (1000) 1000
computer hackers (865) 865
analysis (858) 858
anti-virus software (820) 820
forecasts and trends (747) 747
usage (675) 675
phishing (674) 674
software (633) 633
research (574) 574
identity theft (539) 539
internet crime (521) 521
data encryption (507) 507
web sites (464) 464
security management (440) 440
control (428) 428
laws, regulations and rules (399) 399
electronic mail systems (388) 388
technology application (377) 377
computer industry (352) 352
computer science (351) 351
computer science, information systems (349) 349
smart phones (349) 349
social networks (335) 335
investigations (330) 330
product introduction (330) 330
privacy (323) 323
spam (314) 314
internet fraud (305) 305
prevention (302) 302
threats (300) 300
machine learning (298) 298
banks (286) 286
periodical publishing (282) 282
operating systems (278) 278
statistics (274) 274
security software (264) 264
management (259) 259
mobile devices (257) 257
cloud computing (254) 254
fraud (248) 248
computers (241) 241
distribution (232) 232
surveys (224) 224
algorithms (213) 213
mobile applications (196) 196
schools (195) 195
index medicus (186) 186
smartphones (186) 186
artificial intelligence (185) 185
data integrity (183) 183
software industry (181) 181
web browsers (176) 176
detectors (172) 172
personal information (171) 171
communications industry (170) 170
political aspects (170) 170
telecommunications services industry (169) 169
health aspects (167) 167
internet software (165) 165
systems and data security software (158) 158
services (157) 157
cases (156) 156
security (156) 156
consumer protection (155) 155
banking industry (154) 154
home banking services (151) 151
espionage (145) 145
computer science, software engineering (142) 142
denial of service attacks (141) 141
telecommunications (140) 140
researchers (137) 137
computer science, general (132) 132
education (131) 131
information services (130) 130
access control (129) 129
computer science, theory & methods (128) 128
evaluation (126) 126
personal computers (125) 125
trends (125) 125
hackers (124) 124
leadership (123) 123
studies (123) 123
security services (122) 122
automation (121) 121
information management (119) 119
internet service providers (117) 117
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (31) 31
Robarts - Stacks (2) 2
Baycrest Hospital - Resident/Client Library (1) 1
Collection Dvlpm't (Acquisitions) - Vendor file (1) 1
Engineering & Comp. Sci. - Stacks (1) 1
UofT at Mississauga - Stacks (1) 1
UofT at Scarborough - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (18075) 18075
Spanish (17) 17
Japanese (9) 9
Chinese (5) 5
German (5) 5
French (4) 4
Turkish (3) 3
Korean (2) 2
Portuguese (2) 2
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Network Security, ISSN 1353-4858, 05/2019, Volume 2019, Issue 5, pp. 6 - 9
Increasingly complex multi-cloud architectures and more stringent regulatory environments have increased reliance on encryption – primarily secure sockets... 
Spyware
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 09/2018, Volume 2018, Issue 9, pp. 6 - 9
It was May 2017 when the ransomware attack WannaCry made headlines around the world. The virus brought unprecedented attention to malicious software-based... 
Spyware
Journal Article
International Journal of Infectious Diseases, ISSN 1201-9712, 04/2014, Volume 21, p. 48
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 08/2013, Volume 2013, Issue 8, pp. 11 - 19
For many years, malware has been the subject of intensive study by researchers in industry and academia. Malware production, while not being an organised... 
Spyware
Journal Article
Software World, ISSN 0038-0652, 09/2018, Volume 49, Issue 5, p. 24
Journal Article
Database and Network Journal, ISSN 0265-4490, 02/2016, Volume 46, Issue 1, p. 22
Journal Article
Network Security, ISSN 1353-4858, 07/2016, Volume 2016, Issue 7, pp. 4 - 4
Journal Article
Software World, ISSN 0038-0652, 07/2017, Volume 48, Issue 4, p. 25
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 12/2015, Volume 2015, Issue 12, pp. 1,3 - 1,3
Threat intelligence firm iSight says it has discovered point of sale (POS) system malware that is the most sophisticated and complex seen to date. 
Spyware
Journal Article
Physics Letters B, ISSN 0370-2693, 10/2018, Volume 785, p. 262
Journal Article
Nuclear Physics, Section A, ISSN 0375-9474, 03/2010, Volume 834, Issue 1-4, p. 676
The indirect measurement of.sup.17O(p,[alpha]).sup.14N cross section was performed by means of the Trojan Horse Method. This approach allowed to investigate... 
Spyware
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 05/2012, Volume 2012, Issue 5, pp. 7 - 10
Peter Muhlberger was happy when he bought home his digital camera. He was looking forward to taking high-quality digital images to show his family and friends.... 
Spyware
Journal Article
Database and Network Journal, ISSN 0265-4490, 04/2015, Volume 45, Issue 2, p. 26
Journal Article
Software World, ISSN 0038-0652, 03/2015, Volume 46, Issue 2, p. 26
Journal Article
Illinois Classical Studies, ISSN 0363-1923, 01/2013, Volume 38, p. 149
Journal Article
Software World, ISSN 0038-0652, 01/2012, Volume 43, Issue 1, p. 23
Journal Article
Software World, ISSN 0038-0652, 09/2013, Volume 44, Issue 5, p. 23
Journal Article
Database and Network Journal, ISSN 0265-4490, 08/2011, Volume 41, Issue 4, p. 10
Journal Article
Indian Journal of Pharmacology, ISSN 0253-7613, 01/2018, Volume 50, Issue 1, p. 44
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 2009, Volume 2009, Issue 3, pp. 12 - 13
An increasing number of security experts are questioning the utility of anti-malware tools. They cite malware writers’ ability to test their products against... 
Spyware
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.