Computer security/Related Articles: Difference between revisions
Jump to navigation
Jump to search
Pat Palmer (talk | contribs) m (Text replacement - "{{r|Government Communications Headquarters}}" to "") |
Pat Palmer (talk | contribs) m (Text replacement - "{{r|Extranet}}" to "") |
||
Line 22: | Line 22: | ||
{{r|Cryptanalysis}} | {{r|Cryptanalysis}} | ||
{{r|Distributed computing}} | {{r|Distributed computing}} | ||
{{r|Hacker}} | {{r|Hacker}} |
Revision as of 09:41, 22 June 2024
- See also changes related to Computer security, or pages that link to Computer security or to this page or whose text contains "Computer security".
Parent topics
Subtopics
Bot-suggested topics
Auto-populated based on Special:WhatLinksHere/Computer security. Needs checking by a human.
- Buffer overflow [r]: In computers and computer security, occurs when more data is written to a memory buffer than can fit into the memory buffer. [e]
- CAPTCHA [r]: A Turing test employed most frequently in websites to discriminate between humans and computer programs. [e]
- Canary value [r]: Add brief definition or description
- Classified information [r]: Material collected or created by a government that is subject to limitations on its release to the general public and may have penalties for its unauthorized release. [e]
- Computer science [r]: The study of how computers work, and the algorithms, data structures and design principles used in their operation and programming. [e]
- Computer [r]: A machine that executes a sequence of instructions. [e]
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Distributed computing [r]: A strategy for improving the speed of highly parallelizable tasks by distributing pieces of the problem across many computers that together form a distributed computing system, e.g. BOINC, SETI@home. [e]
- Hacker [r]: An expert, a problem solver, and generally a brilliant programmer. In popular usage, those who illegally break into computer systems. [e]
- Information assurance [r]: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
- Internet Protocol security architecture [r]: Add brief definition or description
- Intranet [r]: A set of networked computers, under one administration, which can only communicate with one another. [e]
- Software Engineering Institute [r]: Add brief definition or description
- Virtual private network [r]: The emulation of a private Wide Area Network (WAN) facility using IP facilities, including the public Internet or private IP backbones. [e]