Computer security/Related Articles: Difference between revisions
Jump to navigation
Jump to search
Pat Palmer (talk | contribs) m (Text replacement - "{{r|Government Communications Headquarters}}" to "") |
No edit summary |
||
(One intermediate revision by one other user not shown) | |||
Line 22: | Line 22: | ||
{{r|Cryptanalysis}} | {{r|Cryptanalysis}} | ||
{{r|Distributed computing}} | {{r|Distributed computing}} | ||
{{r|Hacker}} | {{r|Hacker}} | ||
Line 33: | Line 33: | ||
{{Bot-created_related_article_subpage}} | {{Bot-created_related_article_subpage}} | ||
<!-- Remove the section above after copying links to the other sections. --> | <!-- Remove the section above after copying links to the other sections. --> | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Computer network}} | |||
{{r|Counterespionage}} | |||
{{r|Archive:Fundamentals}} | |||
{{r|Model (theory)}} | |||
{{r|AES competition}} |
Latest revision as of 17:01, 31 July 2024
- See also changes related to Computer security, or pages that link to Computer security or to this page or whose text contains "Computer security".
Parent topics
Subtopics
Bot-suggested topics
Auto-populated based on Special:WhatLinksHere/Computer security. Needs checking by a human.
- Buffer overflow [r]: In computers and computer security, occurs when more data is written to a memory buffer than can fit into the memory buffer. [e]
- CAPTCHA [r]: A Turing test employed most frequently in websites to discriminate between humans and computer programs. [e]
- Canary value [r]: Add brief definition or description
- Classified information [r]: Material collected or created by a government that is subject to limitations on its release to the general public and may have penalties for its unauthorized release. [e]
- Computer science [r]: The study of how computers work, and the algorithms, data structures and design principles used in their operation and programming. [e]
- Computer [r]: A machine that executes a sequence of instructions. [e]
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Distributed computing [r]: A strategy for improving the speed of highly parallelizable tasks by distributing pieces of the problem across many computers that together form a distributed computing system, e.g. BOINC, SETI@home. [e]
- Hacker [r]: An expert, a problem solver, and generally a brilliant programmer. In popular usage, those who illegally break into computer systems. [e]
- Information assurance [r]: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
- Internet Protocol security architecture [r]: Add brief definition or description
- Intranet [r]: A set of networked computers, under one administration, which can only communicate with one another. [e]
- Software Engineering Institute [r]: Add brief definition or description
- Virtual private network [r]: The emulation of a private Wide Area Network (WAN) facility using IP facilities, including the public Internet or private IP backbones. [e]
- Computer network [r]: A collection of computers or digital devices ("nodes") connected by communication links. [e]
- Counterespionage [r]: Add brief definition or description
- Archive:Fundamentals [r]: Add brief definition or description
- Model (theory) [r]: A theoretical construct based on a well-defined set of assumptions. [e]
- AES competition [r]: A competition run by the US National Institute of Standards and Technology to chose a block cipher to become the Advanced Encryption Standard. [e]