X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (9068) 9068
Journal Article (2695) 2695
Magazine Article (2476) 2476
Newsletter (2476) 2476
Trade Publication Article (1045) 1045
Conference Proceeding (158) 158
Transcript (120) 120
Publication (94) 94
Book Review (70) 70
Government Document (46) 46
Report (42) 42
Streaming Video (32) 32
Web Resource (28) 28
Book / eBook (23) 23
Book Chapter (21) 21
Dissertation (14) 14
Data Set (1) 1
Paper (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
spyware (17379) 17379
computer software industry (2506) 2506
computer viruses (2372) 2372
safety and security measures (1992) 1992
computer security (1538) 1538
patents (1500) 1500
internet (1374) 1374
computer crimes (1301) 1301
network security (1289) 1289
cyberterrorism (1282) 1282
methods (1152) 1152
intellectual property (1135) 1135
reports (1121) 1121
malware (1023) 1023
data security (1018) 1018
computer hackers (867) 867
analysis (805) 805
anti-virus software (784) 784
forecasts and trends (741) 741
usage (670) 670
phishing (658) 658
software (634) 634
identity theft (529) 529
internet crime (526) 526
data encryption (511) 511
research (475) 475
web sites (455) 455
security management (441) 441
control (417) 417
laws, regulations and rules (397) 397
electronic mail systems (384) 384
technology application (367) 367
computer science (353) 353
computer science, information systems (349) 349
computer industry (345) 345
smart phones (338) 338
social networks (336) 336
investigations (328) 328
product introduction (326) 326
privacy (316) 316
threats (305) 305
spam (304) 304
prevention (298) 298
internet fraud (293) 293
machine learning (286) 286
banks (283) 283
operating systems (278) 278
periodical publishing (274) 274
management (259) 259
statistics (258) 258
security software (254) 254
cloud computing (252) 252
fraud (251) 251
mobile devices (243) 243
computers (238) 238
distribution (232) 232
surveys (211) 211
algorithms (205) 205
schools (195) 195
smartphones (191) 191
artificial intelligence (187) 187
index medicus (186) 186
mobile applications (185) 185
data integrity (184) 184
software industry (179) 179
web browsers (178) 178
personal information (169) 169
political aspects (169) 169
communications industry (164) 164
detectors (164) 164
telecommunications services industry (163) 163
consumer protection (156) 156
banking industry (154) 154
internet software (154) 154
security (154) 154
services (153) 153
systems and data security software (153) 153
cases (150) 150
home banking services (144) 144
espionage (143) 143
health aspects (143) 143
computer science, software engineering (142) 142
telecommunications (141) 141
denial of service attacks (138) 138
researchers (136) 136
computer science, general (133) 133
education (133) 133
access control (129) 129
computer science, theory & methods (128) 128
information services (128) 128
evaluation (126) 126
personal computers (126) 126
trends (126) 126
hackers (124) 124
leadership (124) 124
security services (124) 124
automation (123) 123
studies (123) 123
internet service providers (118) 118
customer services (116) 116
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (31) 31
Robarts - Stacks (2) 2
Baycrest Hospital - Resident/Client Library (1) 1
Collection Dvlpm't (Acquisitions) - Vendor file (1) 1
Engineering & Comp. Sci. - Stacks (1) 1
UofT at Mississauga - Stacks (1) 1
UofT at Scarborough - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (17373) 17373
Spanish (16) 16
Japanese (10) 10
German (6) 6
Chinese (5) 5
French (4) 4
Korean (3) 3
Turkish (3) 3
Portuguese (2) 2
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Network Security, ISSN 1353-4858, 05/2019, Volume 2019, Issue 5, pp. 6 - 9
Increasingly complex multi-cloud architectures and more stringent regulatory environments have increased reliance on encryption – primarily secure sockets... 
Spyware
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 09/2018, Volume 2018, Issue 9, pp. 6 - 9
It was May 2017 when the ransomware attack WannaCry made headlines around the world. The virus brought unprecedented attention to malicious software-based... 
Spyware
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 08/2013, Volume 2013, Issue 8, pp. 11 - 19
For many years, malware has been the subject of intensive study by researchers in industry and academia. Malware production, while not being an organised... 
Spyware
Journal Article
Software World, ISSN 0038-0652, 09/2018, Volume 49, Issue 5, p. 24
Journal Article
Database and Network Journal, ISSN 0265-4490, 02/2016, Volume 46, Issue 1, p. 22
Journal Article
Network Security, ISSN 1353-4858, 07/2016, Volume 2016, Issue 7, pp. 4 - 4
Journal Article
Software World, ISSN 0038-0652, 07/2017, Volume 48, Issue 4, p. 25
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 12/2015, Volume 2015, Issue 12, pp. 1,3 - 1,3
Threat intelligence firm iSight says it has discovered point of sale (POS) system malware that is the most sophisticated and complex seen to date. 
Spyware
Journal Article
Physics Letters B, ISSN 0370-2693, 10/2018, Volume 785, p. 262
Journal Article
Nuclear Physics, Section A, ISSN 0375-9474, 03/2010, Volume 834, Issue 1-4, p. 676
The indirect measurement of.sup.17O(p,[alpha]).sup.14N cross section was performed by means of the Trojan Horse Method. This approach allowed to investigate... 
Spyware
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 05/2012, Volume 2012, Issue 5, pp. 7 - 10
Peter Muhlberger was happy when he bought home his digital camera. He was looking forward to taking high-quality digital images to show his family and friends.... 
Spyware
Journal Article
Database and Network Journal, ISSN 0265-4490, 04/2015, Volume 45, Issue 2, p. 26
Journal Article
Software World, ISSN 0038-0652, 03/2015, Volume 46, Issue 2, p. 26
Journal Article
Illinois Classical Studies, ISSN 0363-1923, 01/2013, Volume 38, p. 149
Journal Article
Software World, ISSN 0038-0652, 01/2012, Volume 43, Issue 1, p. 23
Journal Article
Software World, ISSN 0038-0652, 09/2013, Volume 44, Issue 5, p. 23
Journal Article
Database and Network Journal, ISSN 0265-4490, 08/2011, Volume 41, Issue 4, p. 10
Journal Article
Indian Journal of Pharmacology, ISSN 0253-7613, 01/2018, Volume 50, Issue 1, p. 44
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 2009, Volume 2009, Issue 3, pp. 12 - 13
An increasing number of security experts are questioning the utility of anti-malware tools. They cite malware writers’ ability to test their products against... 
Spyware
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 2009, Volume 2009, Issue 9, pp. 5 - 8
Believing that net users deserve better than the prevailing no man's land of internet security, Melih Abdulhayoglu of Comodo has founded a forum where... 
Spyware
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.