computer security (Q3469): Difference between revisions
Jump to navigation
Jump to search
Created claim: part of (P7): security (Q2060) |
Created claim: part of (P7): lock picking (Q3750) |
||
(14 intermediate revisions by the same user not shown) | |||
Property / part of | |||
Property / part of: automotive security / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: cybercrime / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: cybersex trafficking / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: computer fraud / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: cybergeddon / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: cyberterrorism / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: cyberwarfare / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: electronic warfare / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: information warfare / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: internet security / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: IoT security: Review, blockchain solutions, and open challenges / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: Cloud computing security / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: API Security / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: hardware security / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: lock picking / rank | |||
Normal rank |
Latest revision as of 14:59, 26 February 2023
the protection of computer systems and networks from theft, damage, زmisuse or data leak
- IT security
- Information technology security
- Cyber security
- cybersecurity
Language | Label | Description | Also known as |
---|---|---|---|
English | computer security |
the protection of computer systems and networks from theft, damage, زmisuse or data leak |
|