X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (917) 917
Newspaper Article (708) 708
Magazine Article (327) 327
Trade Publication Article (322) 322
Book Review (115) 115
Conference Proceeding (110) 110
Web Resource (94) 94
Book / eBook (91) 91
Publication (79) 79
Book Chapter (35) 35
Patent (22) 22
Government Document (8) 8
Newsletter (4) 4
Dissertation (3) 3
Paper (3) 3
Report (2) 2
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
windows operating system (1235) 1235
windows (446) 446
computer security (364) 364
index medicus (322) 322
computer viruses (242) 242
operating systems (209) 209
humans (196) 196
software upgrading (171) 171
computers (168) 168
animals (152) 152
software (150) 150
internet (146) 146
network security (146) 146
analysis (141) 141
software industry (138) 138
malware (127) 127
female (123) 123
male (123) 123
computer software industry (116) 116
neurosciences (99) 99
personal computers (97) 97
servers (87) 87
microsoft windows (84) 84
unix (82) 82
vulnerability (82) 82
linux (80) 80
environmental sciences (75) 75
windows & doors (75) 75
security (69) 69
studies (68) 68
brain (67) 67
research (66) 66
internet crime (65) 65
risk (64) 64
anti-virus software (61) 61
temporal window (61) 61
pregnancy (60) 60
researchers (59) 59
exposure (57) 57
usage (57) 57
hackers (55) 55
management (54) 54
article (52) 52
climate change (52) 52
computer science (52) 52
adult (50) 50
computer information security (50) 50
ecology (50) 50
electronic books (50) 50
children (49) 49
computer simulation (48) 48
critical windows (48) 48
rats (48) 48
adolescent (47) 47
health aspects (47) 47
public, environmental & occupational health (47) 47
clinical neurology (46) 46
product introduction (46) 46
computer networks (44) 44
product development (43) 43
computer science, information systems (42) 42
multidisciplinary sciences (42) 42
safety and security measures (42) 42
concussion (41) 41
risk factors (41) 41
child (40) 40
mathematical models (40) 40
software reviews (39) 39
science (38) 38
medicine (37) 37
risk assessment (37) 37
toxicology (37) 37
models (36) 36
temperature (36) 36
injuries (35) 35
algorithms (34) 34
computer operating systems (34) 34
data encryption (34) 34
disease models, animal (34) 34
disk operating systems (34) 34
mortality (34) 34
networks (34) 34
behavior (33) 33
sistemas operativos (33) 33
broken windows (32) 32
environmental aspects (32) 32
time factors (32) 32
web browsers (32) 32
computer industry (31) 31
computer programs (31) 31
firewalls (31) 31
crime (30) 30
growth (30) 30
methods (30) 30
model (30) 30
traumatic brain injury (30) 30
young adult (30) 30
climate (29) 29
smartphones (29) 29
software packages (29) 29
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Engineering & Comp. Sci. - Stacks (27) 27
Collection Dvlpm't (Acquisitions) - Closed Orders (9) 9
Robarts - Stacks (6) 6
UofT at Mississauga - Stacks (6) 6
UofT at Scarborough - Stacks (6) 6
UTL at Downsview - May be requested (4) 4
Online Resources - Online (3) 3
Gerstein Science - Stacks (2) 2
Architecture Landscape (Shore + Moffat) - Stacks (1) 1
Art - Oversize (1) 1
Astronomy & Astrophysics - Ask at library (1) 1
Astronomy & Astrophysics - Stacks (1) 1
Collection Dvlpm't (Acquisitions) - Cancelled Order (1) 1
Engineering & Comp. Sci. - Circulation Desk (1) 1
Engineering & Comp. Sci. - Missing (1) 1
Faculty of Information - Stacks (1) 1
Innis College - Reference (1) 1
Innis College - Stacks (1) 1
OISE - Stacks (1) 1
Pontifical Inst. Mediaeval Studies - Guest (1) 1
Pontifical Inst. Mediaeval Studies - Library use only (1) 1
Royal Ontario Museum - Oversize (1) 1
St. Michael's College (John M. Kelly) - 2nd Floor (1) 1
UofT at Mississauga - Missing (1) 1
UofT at Scarborough - Oversize (1) 1
Victoria University E.J. Pratt - Oversize (1) 1
Victoria University E.J. Pratt - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (2468) 2468
Chinese (12) 12
French (11) 11
Spanish (11) 11
Korean (4) 4
Russian (3) 3
Arabic (2) 2
Japanese (2) 2
Swedish (2) 2
Italian (1) 1
Polish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Journal Article
Proceedings of the National Academy of Sciences of the United States of America, ISSN 0027-8424, 4/2008, Volume 105, Issue 16, pp. 6145 - 6149
Journal Article
Journal Article
PLoS ONE, ISSN 1932-6203, 2011, Volume 6, Issue 3, pp. e17483 - e17483
Journal Article
Decision Sciences, ISSN 0011-7315, 12/2016, Volume 47, Issue 6, pp. 1073 - 1102
Enterprises experience opportunistic exploits targeted at vulnerable technology. Vulnerabilities in software‐based applications, service systems, enterprise... 
Exploits | Vulnerabilities | Technology | Enterprise Risk Management | INFORMATION SECURITY | MANAGEMENT | DISCLOSURE | ARMS RACES | SOFTWARE SECURITY | LIABILITY | BYPASS-SURGERY | ECONOMICS | COOPERATION | PATCH RELEASE | Risk management | Enterprise risk management | Studies | Priorities | Risk assessment | Software upgrading | Disclosure | Loss control | Windows (intervals) | Tasks | Documents | Risk | Patching | Vulnerability
Journal Article
The Condor, ISSN 0010-5422, 2014, Volume 116, Issue 1, pp. 8 - 23
Journal Article
Journal of Hydrology, ISSN 0022-1694, 08/2019, Volume 575, pp. 454 - 469
Journal Article
JOURNAL OF ATHLETIC TRAINING, ISSN 1062-6050, 04/2016, Volume 51, Issue 4, pp. 329 - 335
Context: Preclinical research has demonstrated a window of vulnerability in the immediate aftermath of concussion wherein continued activity and stimulation... 
HIGH-SCHOOL | SPORT SCIENCES | window of vulnerability | collegiate athletes | EXTRACELLULAR POTASSIUM | TEMPORAL WINDOW | INTERNATIONAL-CONFERENCE | SPORT-RELATED CONCUSSION | symptom reporting | POSTCONCUSSION SYNDROME | FOOTBALL PLAYERS | METABOLIC BRAIN VULNERABILITY | CONSENSUS STATEMENT | mild traumatic brain injuries | UP-REGULATION
Journal Article
IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, 1/2019, pp. 1 - 1
Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. % The study of various... 
patch | Microsoft Windows | disclosure | diversity | Computer hacking | Linux | Data aggregation | Market research | vulnerability | exploit
Journal Article