Export 816 results:
Author Title Type [ Year(Asc)]
2014
PDF icon Download this article (368.68 KB)
PDF icon Download this article (455.6 KB)
PDF icon Download this article (456.15 KB)
PDF icon Download this article (846.35 KB)
Maheux, B. 2014. Assessing the Intentions and Timing of Malware. Technology Innovation Management Review, 4(11): 34-40. http://timreview.ca/article/848
PDF icon Download this article (561.33 KB)
Widenius, M., & Nyman, L. 2014. The Business of Open Source Software: A Primer. Technology Innovation Management Review, 4(1): 4-11. http://timreview.ca/article/756
PDF icon Download this article (625.92 KB)
PDF icon Download this article (506.23 KB)
PDF icon Download this article (467 KB)
PDF icon Download this article (888.41 KB)
PDF icon Download this article (372.1 KB)
PDF icon Download this article (468.76 KB)
PDF icon Download this article (355.82 KB)
Gad, M. 2014. Crimeware Marketplaces and Their Facilitating Technologies. Technology Innovation Management Review, 4(11): 28-33. http://timreview.ca/article/847
PDF icon Download this article (397.42 KB)
Kadivar, M. 2014. Cyber-Attack Attributes. Technology Innovation Management Review, 4(11): 22-27. http://timreview.ca/article/846
PDF icon Download this article (618.21 KB)
PDF icon Download this article (588.86 KB)
PDF icon Download this article (856.67 KB)
Craigen, D., Diakun-Thibault, N., & Purse, R. 2014. Defining Cybersecurity. Technology Innovation Management Review, 4(10): 13-21. http://timreview.ca/article/835
PDF icon Download this article (925.14 KB)
PDF icon Download this article (581.68 KB)
PDF icon Download this article (510.37 KB)
PDF icon Download this article (528.99 KB)
PDF icon Download this article (997.3 KB)
PDF icon Download this article (801.37 KB)
PDF icon Download this article (544.09 KB)
McPhee, C., & Bailetti, T. 2014. Editorial: Cybersecurity (November 2014). Technology Innovation Management Review, 4(11): 3-4. http://timreview.ca/article/843
PDF icon Download this article (258.11 KB)

Pages