X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (9068) 9068
Journal Article (2695) 2695
Magazine Article (2476) 2476
Newsletter (2476) 2476
Trade Publication Article (1045) 1045
Conference Proceeding (158) 158
Transcript (120) 120
Publication (94) 94
Book Review (70) 70
Government Document (46) 46
Report (42) 42
Streaming Video (32) 32
Web Resource (28) 28
Book / eBook (23) 23
Book Chapter (21) 21
Dissertation (14) 14
Data Set (1) 1
Paper (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
spyware (17379) 17379
computer software industry (2506) 2506
computer viruses (2372) 2372
safety and security measures (1992) 1992
computer security (1538) 1538
patents (1500) 1500
internet (1374) 1374
computer crimes (1301) 1301
network security (1289) 1289
cyberterrorism (1282) 1282
methods (1152) 1152
intellectual property (1135) 1135
reports (1121) 1121
malware (1023) 1023
data security (1018) 1018
computer hackers (867) 867
analysis (805) 805
anti-virus software (784) 784
forecasts and trends (741) 741
usage (670) 670
phishing (658) 658
software (634) 634
identity theft (529) 529
internet crime (526) 526
data encryption (511) 511
research (475) 475
web sites (455) 455
security management (441) 441
control (417) 417
laws, regulations and rules (397) 397
electronic mail systems (384) 384
technology application (367) 367
computer science (353) 353
computer science, information systems (349) 349
computer industry (345) 345
smart phones (338) 338
social networks (336) 336
investigations (328) 328
product introduction (326) 326
privacy (316) 316
threats (305) 305
spam (304) 304
prevention (298) 298
internet fraud (293) 293
machine learning (286) 286
banks (283) 283
operating systems (278) 278
periodical publishing (274) 274
management (259) 259
statistics (258) 258
security software (254) 254
cloud computing (252) 252
fraud (251) 251
mobile devices (243) 243
computers (238) 238
distribution (232) 232
surveys (211) 211
algorithms (205) 205
schools (195) 195
smartphones (191) 191
artificial intelligence (187) 187
index medicus (186) 186
mobile applications (185) 185
data integrity (184) 184
software industry (179) 179
web browsers (178) 178
personal information (169) 169
political aspects (169) 169
communications industry (164) 164
detectors (164) 164
telecommunications services industry (163) 163
consumer protection (156) 156
banking industry (154) 154
internet software (154) 154
security (154) 154
services (153) 153
systems and data security software (153) 153
cases (150) 150
home banking services (144) 144
espionage (143) 143
health aspects (143) 143
computer science, software engineering (142) 142
telecommunications (141) 141
denial of service attacks (138) 138
researchers (136) 136
computer science, general (133) 133
education (133) 133
access control (129) 129
computer science, theory & methods (128) 128
information services (128) 128
evaluation (126) 126
personal computers (126) 126
trends (126) 126
hackers (124) 124
leadership (124) 124
security services (124) 124
automation (123) 123
studies (123) 123
internet service providers (118) 118
customer services (116) 116
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (31) 31
Robarts - Stacks (2) 2
Baycrest Hospital - Resident/Client Library (1) 1
Collection Dvlpm't (Acquisitions) - Vendor file (1) 1
Engineering & Comp. Sci. - Stacks (1) 1
UofT at Mississauga - Stacks (1) 1
UofT at Scarborough - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (17373) 17373
Spanish (16) 16
Japanese (10) 10
German (6) 6
Chinese (5) 5
French (4) 4
Korean (3) 3
Turkish (3) 3
Portuguese (2) 2
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Network Security, ISSN 1353-4858, 05/2018, Volume 2018, Issue 5, pp. 12 - 13
The deluge of new malware specimens being launched against businesses everywhere on the planet is fast rendering traditional anti-virus (AV) cyber-security... 
Spyware
Journal Article
e & i Elektrotechnik und Informationstechnik, ISSN 0932-383X, 06/2018, Volume 135, Issue 3, p. 264
To access, purchase, authenticate, or subscribe to the full-text of this article, please visit this link: http://dx.doi.org/10.1007/s00502-018-0616-5 Smart... 
Infrastructure (Economics) | Sensors | Spyware
Journal Article
Database and Network Journal, ISSN 0265-4490, 08/2015, Volume 45, Issue 4, p. 22
Journal Article
Network Security, ISSN 1353-4858, 2005, Volume 2005, Issue 11, pp. 16 - 18
Today's threats are almost Wall Street in the purity of their aim – it's all about the money! Organised crime is using the Internet more and more as a route to... 
Spyware
Journal Article
Chemosphere, ISSN 0045-6535, 10/2017, Volume 185, p. 192
To access, purchase, authenticate, or subscribe to the full-text of this article, please visit this link: http://dx.doi.org/10.1016/j.chemosphere.2017.07.009... 
Enzymes | Toiletries | Personal care industry | Spyware
Journal Article
Network Security, ISSN 1353-4858, 2006, Volume 2006, Issue 1, pp. 18 - 19
These days most organizations have tailored their security policies to minimise the risk of infection and disruption by malware. Rootkits are often categorised... 
Spyware
Journal Article
Database and Network Journal, ISSN 0265-4490, 02/2009, Volume 39, Issue 1, p. 25
Journal Article
Network Security, ISSN 1353-4858, 2004, Volume 2004, Issue 10, pp. 11 - 15
In the last few years we have seen the evolution of computer viruses from a laboratory phenomenon, of interest to a small number of technical experts into a... 
Spyware
Journal Article
Physics Letters, Section B: Nuclear, Elementary Particle and High-Energy Physics, ISSN 0370-2693, 11/2011, Volume 705, Issue 5, p. 546
Journal Article
PC Quest, ISSN 0971-216X, 11/2016
Journal Article
Computer Reseller News (UK), ISSN 1744-3156, 10/2016, p. S9
Journal Article
Foreign Policy, ISSN 0015-7228, 05/2016, Issue 218, p. 28
Journal Article
Journal of Computer Virology and Hacking Techniques, ISSN 1772-9890, 11/2013, Volume 9, Issue 4, pp. 179 - 192
Metamorphic malware is capable of changing its internal structure without altering its functionality. A common signature is nonexistent in highly metamorphic... 
Computer Science, general | Computer Science
Journal Article
Database and Network Journal, ISSN 0265-4490, 08/2008, Volume 38, Issue 4, p. 25
Journal Article
The European Physical Journal A - Hadrons and Nuclei, ISSN 1434-6001, 05/2016, Volume 52, Issue 5, p. 1
To access, purchase, authenticate, or subscribe to the full-text of this article, please visit this link: http://dx.doi.org/10.1140/epja/i2016-16136-8 
Analysis | Resveratrol | Spyware | Nuclear physics
Journal Article
Network Security, ISSN 1353-4858, 04/2017, Volume 2017, Issue 4, pp. 7 - 11
When a computer is compromised, one of the first things a security or forensic specialist will look for is software that shouldn't be there. Many forms of... 
Spyware
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.