Computer security/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Daniel Mietchen m (Robot: encapsulating subpages template in noinclude tag) |
imported>Housekeeping Bot m (Automated edit: Adding CZ:Workgroups to Category:Bot-created Related Articles subpages) |
||
Line 31: | Line 31: | ||
{{r|Virtual private network}} | {{r|Virtual private network}} | ||
{{Bot-created_related_article_subpage}} | |||
<!-- Remove the section above after copying links to the other sections. --> | <!-- Remove the section above after copying links to the other sections. --> |
Revision as of 14:37, 11 January 2010
- See also changes related to Computer security, or pages that link to Computer security or to this page or whose text contains "Computer security".
Parent topics
Subtopics
Bot-suggested topics
Auto-populated based on Special:WhatLinksHere/Computer security. Needs checking by a human.
- Buffer overflow [r]: In computers and computer security, occurs when more data is written to a memory buffer than can fit into the memory buffer. [e]
- CAPTCHA [r]: A Turing test employed most frequently in websites to discriminate between humans and computer programs. [e]
- Canary value [r]: Add brief definition or description
- Classified information [r]: Material collected or created by a government that is subject to limitations on its release to the general public and may have penalties for its unauthorized release. [e]
- Computer science [r]: The study of how computers work, and the algorithms, data structures and design principles used in their operation and programming. [e]
- Computer [r]: A machine that executes a sequence of instructions. [e]
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Distributed computing [r]: A strategy for improving the speed of highly parallelizable tasks by distributing pieces of the problem across many computers that together form a distributed computing system, e.g. BOINC, SETI@home. [e]
- Extranet [r]: Add brief definition or description
- Government Communications Headquarters [r]: Add brief definition or description
- Hacker [r]: An expert, a problem solver, and generally a brilliant programmer. In popular usage, those who illegally break into computer systems. [e]
- Information assurance [r]: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
- Internet Protocol security architecture [r]: Add brief definition or description
- Intranet [r]: A set of networked computers, under one administration, which can only communicate with one another. [e]
- Software Engineering Institute [r]: Add brief definition or description
- Virtual private network [r]: The emulation of a private Wide Area Network (WAN) facility using IP facilities, including the public Internet or private IP backbones. [e]