X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (9082) 9082
Journal Article (2698) 2698
Magazine Article (2477) 2477
Newsletter (2475) 2475
Trade Publication Article (1047) 1047
Conference Proceeding (159) 159
Transcript (120) 120
Publication (94) 94
Book Review (70) 70
Government Document (46) 46
Report (42) 42
Streaming Video (32) 32
Web Resource (28) 28
Book / eBook (23) 23
Book Chapter (21) 21
Dissertation (14) 14
Data Set (1) 1
Paper (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
spyware (17397) 17397
computer software industry (2508) 2508
computer viruses (2374) 2374
safety and security measures (1996) 1996
computer security (1540) 1540
patents (1497) 1497
internet (1377) 1377
computer crimes (1304) 1304
network security (1290) 1290
cyberterrorism (1288) 1288
methods (1152) 1152
intellectual property (1133) 1133
reports (1129) 1129
malware (1027) 1027
data security (1019) 1019
computer hackers (868) 868
analysis (805) 805
anti-virus software (785) 785
forecasts and trends (744) 744
usage (670) 670
phishing (659) 659
software (634) 634
identity theft (530) 530
internet crime (528) 528
data encryption (511) 511
research (476) 476
web sites (455) 455
security management (442) 442
control (417) 417
laws, regulations and rules (398) 398
electronic mail systems (384) 384
technology application (367) 367
computer science (353) 353
computer science, information systems (352) 352
computer industry (344) 344
smart phones (338) 338
social networks (336) 336
product introduction (327) 327
investigations (326) 326
privacy (316) 316
spam (305) 305
threats (305) 305
prevention (298) 298
internet fraud (293) 293
machine learning (286) 286
banks (284) 284
operating systems (277) 277
periodical publishing (273) 273
management (259) 259
statistics (259) 259
cloud computing (254) 254
security software (254) 254
fraud (251) 251
mobile devices (243) 243
computers (238) 238
distribution (232) 232
surveys (210) 210
algorithms (206) 206
schools (194) 194
smartphones (190) 190
artificial intelligence (187) 187
index medicus (187) 187
mobile applications (185) 185
data integrity (182) 182
software industry (178) 178
web browsers (178) 178
personal information (169) 169
political aspects (169) 169
communications industry (164) 164
detectors (164) 164
telecommunications services industry (163) 163
consumer protection (157) 157
security (157) 157
internet software (154) 154
banking industry (153) 153
services (153) 153
systems and data security software (153) 153
cases (152) 152
home banking services (144) 144
computer science, software engineering (143) 143
espionage (143) 143
health aspects (143) 143
telecommunications (141) 141
researchers (139) 139
denial of service attacks (138) 138
computer science, general (133) 133
education (131) 131
computer science, theory & methods (130) 130
access control (128) 128
information services (128) 128
evaluation (126) 126
personal computers (126) 126
trends (126) 126
automation (124) 124
hackers (124) 124
leadership (124) 124
security services (124) 124
studies (124) 124
internet service providers (117) 117
customer services (115) 115
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (31) 31
Robarts - Stacks (2) 2
Baycrest Hospital - Resident/Client Library (1) 1
Collection Dvlpm't (Acquisitions) - Vendor file (1) 1
Engineering & Comp. Sci. - Stacks (1) 1
UofT at Mississauga - Stacks (1) 1
UofT at Scarborough - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (17391) 17391
Spanish (16) 16
Japanese (10) 10
German (6) 6
Chinese (5) 5
French (4) 4
Korean (3) 3
Turkish (3) 3
Portuguese (2) 2
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Database and Network Journal, ISSN 0265-4490, 04/2010, Volume 40, Issue 2, p. 26
Journal Article
Software World, ISSN 0038-0652, 03/2010, Volume 41, Issue 2, p. 25
Journal Article
Fuel, ISSN 0016-2361, 10/2014, Volume 134, p. 659
acents Phase behavior and viscosity reduction of CO.sub.2-saturated light oil were studied. acents CO.sub.2 soaking effect on miscible CO.sub.2 flooding in a... 
Floods | Petroleum mining | Spyware
Journal Article
Network Security, ISSN 1353-4858, 2005, Volume 2005, Issue 6, pp. 16 - 18
Gone are the days when virus writers were driven simply by the kudos of a high profile attack. Criminal profit is their next step - but this is achieved by... 
Spyware
Journal Article
Software World, ISSN 0038-0652, 01/2010, Volume 41, Issue 1, p. 24
Journal Article
The European Physical Journal A - Hadrons and Nuclei, ISSN 1434-6001, 02/2016, Volume 52, Issue 2, p. 1
To access, purchase, authenticate, or subscribe to the full-text of this article, please visit this link: http://dx.doi.org/10.1140/epja/i2016-16024-3 
Gamma rays | Measurement | Spyware
Journal Article
Database and Network Journal, ISSN 0265-4490, 12/2009, Volume 39, Issue 6, p. 25
Journal Article
RISTI - Revista Ibérica de Sistemas e Tecnologias de Informação, ISSN 1646-9895, 01/2019, Issue 31, pp. 82 - 93
En los ultimos anos, la consolidacion de Android, como el sistema operativo mas utilizado en Smartphone lo convierte en blanco del mayor numero de amenazas... 
Spyware | Smart phones
Journal Article
Transactions on Emerging Telecommunications Technologies, ISSN 2161-3915, 05/2016, Volume 27, Issue 5, pp. 675 - 684
With the popularity of Android devices, mobile malware in Android has became more prevalent. Malware causes lots of harm to users, such as stealing personal... 
PERMISSION | TELECOMMUNICATIONS
Journal Article
Software World, ISSN 0038-0652, 11/2009, Volume 40, Issue 6, p. 24
Journal Article
Database and Network Journal, ISSN 0265-4490, 10/2009, Volume 39, Issue 5, p. 25
Journal Article
Fuel, ISSN 0016-2361, 12/2018, Volume 234, p. 814
In this paper, four different injection schemes, i.e., CO.sub.2 continuous gas injection (CGI), gas injection (GI) + soaking, pulse injection, and... 
Petroleum mining | Analysis | Permeability | Petroleum industry | Spyware
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 02/2017, Volume 2017, Issue 2, pp. 1,3 - 1,3
New reports show that fraud and computer-based attacks are rapidly overtaking all other forms of crime in terms of the number of incidents. And the value of... 
Spyware | Fraud
Journal Article
Software World, ISSN 0038-0652, 09/2009, Volume 40, Issue 5, p. 24
Journal Article
Software World, ISSN 0038-0652, 09/2009, Volume 40, Issue 5, p. 23
Journal Article
Database and Network Journal, ISSN 0265-4490, 08/2009, Volume 39, Issue 4, p. 26
Journal Article
Computer Fraud & Security, ISSN 1361-3723, 11/2014, Volume 2014, Issue 11, pp. 5 - 8
Advertising is pervasive on the Internet these days. It's usually the primary income stream for many of the services, such as Facebook and Google, that we take... 
Advertising | Spyware
Journal Article
Database and Network Journal, ISSN 0265-4490, 10/2015, Volume 45, Issue 5, p. 10
Journal Article
Database and Network Journal, ISSN 0265-4490, 06/2009, Volume 39, Issue 3, p. 24
Journal Article
Database and Network Journal, ISSN 0265-4490, 06/2009, Volume 39, Issue 3, p. 25
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.