Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
Other:
CSV
JSON-LD
Faceted Browser
Sparql Endpoint
About:
Outline of computer security
An Entity of Type:
Thing
,
from Named Graph:
http://dbpedia.org
,
within Data Space:
dbpedia-live.demo.openlinksw.com
Overview of and topical guide to computer security
Property
Value
dbo:
description
overview of and topical guide to computer security
(en)
مفهمومی برای امنیت در شبکه
(fa)
dbo:
wikiPageExternalLink
http://geer.tinho.net/geer.nro.6xi13.txt
http://secdocs.net/manual/lp-sec/
http://www.projectauditors.com/Dictionary2/1.8/index.php/index/4.xhtml/
http://www.yourwindow.to/information-security/
https://www.cr0.org/paper/jt-ce-sid_linux.pdf
https://www.usatoday.com/tech/news/story/2012-07-26/black-hat-cyber-threat/56533460/1
http://www.cyberoam.com/blog/the-layered-defense-approach-to-security/
https://www.justice.gov/oig/reports/FBI/a1122r.pdf
https://fas.org/sgp/crs/misc/R42507.pdf
http://www.securityfocus.com/vulnerabilities
http://www.sans.org/top20/
http://secunia.com/product/
https://www.kb.cert.org/vuls/
http://www.kernelthread.com/publications/security/index.html
https://web.archive.org/web/20061011090154/http:/www.acsa-admin.org/2001/papers/110.pdf
https://web.archive.org/web/20130311053005/http:/www.justice.gov/oig/reports/FBI/a1122r.pdf
http://www.infoworld.com/article/2626907/endpoint-protection/the-ultimate-guide-to-windows-7-security.html
dbo:
wikiPageWikiLink
dbr
:TACACS
dbr
:Microsoft_Research
dbr
:List_of_cryptographic_file_systems
dbr
:OPNsense
dbr
:UK_cyber_security_community
dbr
:2600:_The_Hacker_Quarterly
dbr
:Context-based_access_control
dbr
:Dual-homed
dbr
:Vyatta
dbr
:Bugtraq
dbr
:Security_alarm
dbr
:Network_security
dbr
:Internet_security
dbr
:AV-TEST
dbr
:Hacking_tool
dbr
:Peter_Gutmann_(computer_scientist)
dbr
:Cynthia_Dwork
dbr
:Exploit_(computer_security)
dbr
:Monica_S._Lam
dbr
:Security
dbr
:Shafi_Goldwasser
dbr
:United_States_Department_of_Defense
dbr
:FreeBSD
dbr
:National_Security_Agency
dbr
:The_Art_of_Intrusion
dbr
:Information_Systems_Security_Association
dbr
:SPNEGO
dbr
:Vulnerability_management
dbr
:Eavesdropping
dbr
:Air_Force_Cyber_Command_(Provisional)
dbr
:Social_engineering_(security)
dbr
:Data_loss_prevention_software
dbr
:Data_security
dbr
:Information_privacy
dbr
:Phil_Zimmermann
dbr
:Script_kiddie
dbr
:Debian
dbr
:Public_Safety_Canada
dbr
:Hacking:_The_Art_of_Exploitation
dbr
:Device_fingerprint
dbr
:Stefan_Brands
dbr
:McAfee
dbr
:Computer_and_network_surveillance
dbr
:Payload_(computing)
dbr
:Cyber_spying
dbr
:SecurityFocus
dbr
:Encryption_software
dbr
:Antivirus_software
dbr
:Computer
dbr
:Computer_virus
dbr
:Internet
dbr
:Internet_Watch_Foundation
dbr
:Linux
dbr
:Malware
dbr
:Mobile_security
dbr
:United_States
dbr
:Keystroke_logging
dbr
:PfSense
dbr
:Adware
dbr
:Backup
dbr
:Authentication
dbr
:Authorization
dbr
:IPsec
dbr
:Hard_disk_drive_failure
dbr
:International_Computer_Security_Association
dbr
:The_Hacker's_Handbook
dbr
:FBI_Criminal,_Cyber,_Response,_and_Services_Branch
dbr
:FBI_Cyber_Division
dbr
:Cypherpunks_(book)
dbr
:Information_Card_Foundation
dbr
:Man-in-the-middle_attack
dbr
:Secure_Shell
dbc
:Outlines_of_sciences
dbr
:Underground_(Dreyfus_book)
dbr
:CERT_Coordination_Center
dbr
:Congressional_Research_Service
dbr
:Computer_network
dbr
:Ian_Goldberg
dbr
:Deborah_Estrin
dbr
:Denial-of-service_attack
dbr
:Federal_Bureau_of_Investigation
dbr
:Kevin_Mitnick
dbr
:Operating_system
dbc
:Computer_security
dbr
:Load_balancing_(computing)
dbr
:Computer_security
dbr
:Internet_privacy
dbr
:Kerberos_(protocol)
dbr
:File_deletion
dbr
:Failover
dbr
:Virus_Bulletin
dbr
:Phishing
dbr
:Rootkit
dbr
:Smartphone
dbr
:Spyware
dbr
:Trojan_horse_(computing)
dbr
:M0n0wall
dbr
:Intrusion_detection_system
dbr
:Physical_security
dbr
:Stanford_University
dbr
:USA_Today
dbr
:Daniel_J._Bernstein
dbr
:Dawn_Song
dbr
:Bitcoin
dbr
:Distributed_denial-of-service_attack
dbr
:Cyberspace
dbr
:Patch_(computing)
dbr
:Hardware_keylogger
dbr
:Crypto:_How_the_Code_Rebels_Beat_the_G...ent—Saving_Privacy_in_the_Digital_Age
dbr
:Next-Generation_Firewall
dbr
:Lorrie_Cranor
dbr
:Firewall_(computing)
dbr
:John_McAfee
dbr
:Spear_phishing
dbr
:Password
dbr
:Cyberwarfare
dbr
:Outline_(list)
dbr
:NTLMSSP
dbr
:Norwegian_Cyber_Defence_Force
dbc
:Wikipedia_outlines
dbr
:Adam_Back
dbr
:Access_control
dbr
:Pretty_Good_Privacy
dbr
:Password_cracking
dbr
:CERIAS
dbr
:Attrition_(website)
dbr
:Australian_Information_Security_Association
dbr
:Moti_Yung
dbr
:TCP_hole_punching
dbr
:User_account
dbr
:Virtual_private_network
dbr
:Computer_worm
dbr
:OpenVPN
dbr
:Data_loss
dbr
:Norwegian_Armed_Forces
dbr
:Application_security
dbr
:Software_cracking
dbr
:Password_length_parameter
dbr
:ARNES
dbr
:Brian_LaMacchia
dbr
:Firewall_pinhole
dbr
:Firewalls_and_Internet_Security
dbr
:ICMP_hole_punching
dbr
:Knowledge-based_authentication
dbr
:L._Jean_Camp
dbr
:Open_port
dbr
:The_Hacker_Crackdown
dbr
:Microsoft_Digital_Crimes_Unit
dbr
:OWASP
dbr
:Security_guard
dbr
:Network_Security_Toolkit
dbr
:Secure_Password_Authentication
dbr
:Secure_coding
dbr
:Security_bug
dbr
:VyOS
dbr
:United_States_armed_forces
dbr
:Ipfirewall
dbr
:Packet_analyzer
dbr
:Bruce_Schneier
dbr
:Integrated_Windows_Authentication
dbr
:Stateful_firewall
dbr
:IPFilter
dbr
:Ross_J._Anderson
dbr
:UDP_hole_punching
dbr
:List_of_router_and_firewall_distributions
dbr
:United_States_Strategic_Command
dbr
:Security-focused_operating_system
dbr
:Internet_police
dbr
:The_Art_of_Deception
dbr
:Paul_Carl_Kocher
dbr
:AEGIS_SecureConnect
dbr
:Unified_Combatant_Command
dbr
:Joan_Feigenbaum
dbr
:Department_of_Defense_Cyber_Crime_Center
dbr
:Laptop_theft
dbr
:Computer_crime
dbr
:Lock_(security_device)
dbr
:Business_continuity
dbr
:Vulnerability_(computing)
dbr
:Cyber_crime
dbr
:Threat_(computer)
dbr
:Gene_Spafford
dbr
:Lawrence_A._Gordon
dbr
:Annie_Anton
dbr
:Access_Control_Systems
dbr
:Oulu_University_Secure_Programming_Group
dbr
:Out_of_the_Inner_Circle
dbr
:Carnegie-Mellon_University
dbr
:Hacker_(term)
dbr
:Multi-factor_authentication
dbr
:Virtual_firewall
dbr
:Books_on_cryptography
dbr
:Security_software
dbr
:Hacker_(computer_security)
dbr
:Intel_Corporation
dbr
:GFDL
dbr
:Natural_disasters
dbr
:Computer_access_control
dbr
:Computer_lock
dbr
:BSD_Router_Project
dbr
:Intrusion_prevention_system
dbr
:Rubber-hose_cryptanalysis
dbr
:Canadian_Cyber_Incident_Response_Centre
dbr
:Expectation_of_privacy
dbr
:List_of_computer_criminals
dbr
:Keylogger
dbr
:NAT_hole_punching
dbr
:Georgia_Tech_Information_Security_Center
dbr
:Wiretapped.net
dbr
:HTTP_Cookie
dbr
:Mobile_secure_gateway
dbr
:The_Cuckoo's_Egg
dbr
:Personally_identifiable_information
dbr
:Lawful_Interception
dbr
:War_Driving
dbr
:Web_bug
dbr
:Zero-day_attack
dbr
:Zone_Alarm
dbr
:List_of_antivirus_software
dbr
:Cyber_security_and_countermeasure
dbr
:ICSA_Labs
dbr
:World_Wide_Web_Security
dbr
:Timeline_of_computer_security_hacker_history
dbr
:List_of_firewalls
dbr
:Local_Shared_Object
dbr
:Secunia
dbr
:Security_by_design
dbr
:US-CERT
dbr
:USCYBERCOM
dbr
:Audit_(computer_access_control)
dbr
:Patch(computing)
dbr
:Theft_recovery_software
dbr
:West_Coast_Labs
dbp:
date
2014-09-26
(xsd:date)
2015-02-02
(xsd:date)
dbp:
url
https://web.archive.org/web/20140926222042/http:/secdocs.net/manual/lp-sec/
https://web.archive.org/web/20150202225847/http:/www.kernelthread.com/publications/security/index.html
dbp:
wikiPageUsesTemplate
dbt
:Cite_book
dbt
:Reflist
dbt
:Clear
dbt
:See_also
dbt
:Outline_footer
dbt
:Sister_project_links
dbt
:Transclude_lead_excerpt
dbt
:Usurped
dbt
:Webarchive
dbt
:Short_description
dct:
subject
dbc
:Outlines_of_computing_and_engineering
dbc
:Outlines
dbc
:Computer_security
rdfs:
label
Outline of computer security
(en)
owl:
sameAs
freebase
:Outline of computer security
yago-res
:Outline of computer security
wikidata
:Outline of computer security
dbpedia-fa
:Outline of computer security
dbpedia-global
:Outline of computer security
dbr
:Outline of computer security
prov:
wasDerivedFrom
wikipedia-en
:Outline_of_computer_security?oldid=1295694220&ns=0
foaf:
isPrimaryTopicOf
wikipedia-en
:Outline_of_computer_security
is
dbo:
wikiPageWikiLink
of
dbr
:Outline_of_cryptography
dbr
:Computer_security
dbr
:Cybersecurity_information_technology_list
dbr
:Outline_of_computers
is
foaf:
primaryTopic
of
wikipedia-en
:Outline_of_computer_security
This content was extracted from
Wikipedia
and is licensed under the
Creative Commons Attribution-ShareAlike 4.0 International