Computer security/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Daniel Mietchen
m (Robot: encapsulating subpages template in noinclude tag)
No edit summary
 
(3 intermediate revisions by 2 users not shown)
Line 22: Line 22:
{{r|Cryptanalysis}}
{{r|Cryptanalysis}}
{{r|Distributed computing}}
{{r|Distributed computing}}
{{r|Extranet}}
 
{{r|Government Communications Headquarters}}
 
{{r|Hacker}}
{{r|Hacker}}
{{r|Information assurance}}
{{r|Information assurance}}
Line 31: Line 31:
{{r|Virtual private network}}
{{r|Virtual private network}}


[[Category:Bot-created Related Articles subpages]]
{{Bot-created_related_article_subpage}}
<!-- Remove the section above after copying links to the other sections. -->
<!-- Remove the section above after copying links to the other sections. -->
==Articles related by keyphrases (Bot populated)==
{{r|Computer network}}
{{r|Counterespionage}}
{{r|Archive:Fundamentals}}
{{r|Model (theory)}}
{{r|AES competition}}

Latest revision as of 16:01, 31 July 2024

This article is a stub and thus not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Computer security.
See also changes related to Computer security, or pages that link to Computer security or to this page or whose text contains "Computer security".

Parent topics

Subtopics

Other related topics

Bot-suggested topics

Auto-populated based on Special:WhatLinksHere/Computer security. Needs checking by a human.

  • Buffer overflow [r]: In computers and computer security, occurs when more data is written to a memory buffer than can fit into the memory buffer. [e]
  • CAPTCHA [r]: A Turing test employed most frequently in websites to discriminate between humans and computer programs. [e]
  • Canary value [r]: Add brief definition or description
  • Classified information [r]: Material collected or created by a government that is subject to limitations on its release to the general public and may have penalties for its unauthorized release. [e]
  • Computer science [r]: The study of how computers work, and the algorithms, data structures and design principles used in their operation and programming. [e]
  • Computer [r]: A machine that executes a sequence of instructions. [e]
  • Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
  • Distributed computing [r]: A strategy for improving the speed of highly parallelizable tasks by distributing pieces of the problem across many computers that together form a distributed computing system, e.g. BOINC, SETI@home. [e]


Articles related by keyphrases (Bot populated)