X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (9096) 9096
Journal Article (2702) 2702
Newsletter (2535) 2535
Magazine Article (2477) 2477
Trade Publication Article (1048) 1048
Conference Proceeding (159) 159
Transcript (110) 110
Publication (94) 94
Book Review (70) 70
Government Document (46) 46
Report (42) 42
Streaming Video (33) 33
Web Resource (28) 28
Book / eBook (23) 23
Book Chapter (21) 21
Dissertation (13) 13
Data Set (1) 1
Paper (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
spyware (17466) 17466
computer software industry (2570) 2570
computer viruses (2384) 2384
safety and security measures (1999) 1999
patents (1555) 1555
computer security (1549) 1549
internet (1384) 1384
computer crimes (1313) 1313
cyberterrorism (1290) 1290
network security (1290) 1290
methods (1200) 1200
intellectual property (1191) 1191
reports (1141) 1141
malware (1047) 1047
data security (1019) 1019
computer hackers (867) 867
analysis (805) 805
anti-virus software (786) 786
forecasts and trends (744) 744
usage (670) 670
phishing (653) 653
software (639) 639
internet crime (554) 554
identity theft (529) 529
data encryption (510) 510
research (480) 480
web sites (454) 454
security management (442) 442
control (417) 417
laws, regulations and rules (396) 396
electronic mail systems (384) 384
technology application (368) 368
computer science (353) 353
computer science, information systems (353) 353
computer industry (346) 346
smart phones (340) 340
social networks (340) 340
product introduction (327) 327
investigations (324) 324
privacy (316) 316
spam (307) 307
threats (306) 306
prevention (298) 298
internet fraud (292) 292
machine learning (288) 288
banks (285) 285
operating systems (277) 277
periodical publishing (274) 274
statistics (260) 260
management (259) 259
fraud (256) 256
cloud computing (254) 254
security software (254) 254
mobile devices (247) 247
computers (240) 240
distribution (232) 232
surveys (211) 211
algorithms (206) 206
smartphones (195) 195
artificial intelligence (189) 189
mobile applications (188) 188
index medicus (187) 187
schools (187) 187
data integrity (184) 184
software industry (179) 179
web browsers (177) 177
personal information (170) 170
political aspects (169) 169
communications industry (165) 165
detectors (164) 164
telecommunications services industry (164) 164
consumer protection (157) 157
security (156) 156
banking industry (155) 155
internet software (154) 154
services (154) 154
systems and data security software (153) 153
cases (151) 151
espionage (148) 148
home banking services (144) 144
computer science, software engineering (143) 143
health aspects (142) 142
researchers (142) 142
telecommunications (142) 142
denial of service attacks (138) 138
computer science, general (133) 133
computer science, theory & methods (130) 130
access control (129) 129
education (129) 129
information services (127) 127
evaluation (126) 126
hackers (126) 126
personal computers (126) 126
trends (126) 126
automation (125) 125
leadership (125) 125
studies (124) 124
security services (123) 123
internet service providers (118) 118
customer services (116) 116
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (31) 31
Robarts - Stacks (2) 2
Baycrest Hospital - Resident/Client Library (1) 1
Collection Dvlpm't (Acquisitions) - Vendor file (1) 1
Engineering & Comp. Sci. - Stacks (1) 1
UofT at Mississauga - Stacks (1) 1
UofT at Scarborough - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (17460) 17460
Spanish (16) 16
Japanese (9) 9
German (6) 6
Chinese (5) 5
French (4) 4
Korean (3) 3
Turkish (3) 3
Portuguese (2) 2
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Network Security, ISSN 1353-4858, 05/2019, Volume 2019, Issue 5, pp. 6 - 9
Increasingly complex multi-cloud architectures and more stringent regulatory environments have increased reliance on encryption – primarily secure sockets... 
Spyware
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 09/2018, Volume 2018, Issue 9, pp. 6 - 9
It was May 2017 when the ransomware attack WannaCry made headlines around the world. The virus brought unprecedented attention to malicious software-based... 
Spyware
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 08/2013, Volume 2013, Issue 8, pp. 11 - 19
For many years, malware has been the subject of intensive study by researchers in industry and academia. Malware production, while not being an organised... 
Spyware
Journal Article
Software World, ISSN 0038-0652, 09/2018, Volume 49, Issue 5, p. 24
Journal Article
Database and Network Journal, ISSN 0265-4490, 02/2016, Volume 46, Issue 1, p. 22
Journal Article
Network Security, ISSN 1353-4858, 07/2016, Volume 2016, Issue 7, pp. 4 - 4
Journal Article
Software World, ISSN 0038-0652, 07/2017, Volume 48, Issue 4, p. 25
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 12/2015, Volume 2015, Issue 12, pp. 1,3 - 1,3
Threat intelligence firm iSight says it has discovered point of sale (POS) system malware that is the most sophisticated and complex seen to date. 
Spyware
Journal Article
Physics Letters B, ISSN 0370-2693, 10/2018, Volume 785, p. 262
Journal Article
Nuclear Physics, Section A, ISSN 0375-9474, 03/2010, Volume 834, Issue 1-4, p. 676
The indirect measurement of.sup.17O(p,[alpha]).sup.14N cross section was performed by means of the Trojan Horse Method. This approach allowed to investigate... 
Spyware
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 05/2012, Volume 2012, Issue 5, pp. 7 - 10
Peter Muhlberger was happy when he bought home his digital camera. He was looking forward to taking high-quality digital images to show his family and friends.... 
Spyware
Journal Article
Database and Network Journal, ISSN 0265-4490, 04/2015, Volume 45, Issue 2, p. 26
Journal Article
Software World, ISSN 0038-0652, 03/2015, Volume 46, Issue 2, p. 26
Journal Article
Illinois Classical Studies, ISSN 0363-1923, 01/2013, Volume 38, p. 149
Journal Article
Software World, ISSN 0038-0652, 01/2012, Volume 43, Issue 1, p. 23
Journal Article
Software World, ISSN 0038-0652, 09/2013, Volume 44, Issue 5, p. 23
Journal Article
Database and Network Journal, ISSN 0265-4490, 08/2011, Volume 41, Issue 4, p. 10
Journal Article
Indian Journal of Pharmacology, ISSN 0253-7613, 01/2018, Volume 50, Issue 1, p. 44
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 2009, Volume 2009, Issue 3, pp. 12 - 13
An increasing number of security experts are questioning the utility of anti-malware tools. They cite malware writers’ ability to test their products against... 
Spyware
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 2009, Volume 2009, Issue 9, pp. 5 - 8
Believing that net users deserve better than the prevailing no man's land of internet security, Melih Abdulhayoglu of Comodo has founded a forum where... 
Spyware
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.