computer security (Q3469): Difference between revisions
Jump to navigation
Jump to search
Created claim: part of (P7): cybergeddon (Q3729) |
Created claim: part of (P7): lock picking (Q3750) |
||
(9 intermediate revisions by the same user not shown) | |||
Property / part of | |||
Property / part of: cyberterrorism / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: cyberwarfare / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: electronic warfare / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: information warfare / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: internet security / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: IoT security: Review, blockchain solutions, and open challenges / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: Cloud computing security / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: API Security / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: hardware security / rank | |||
Normal rank | |||
Property / part of | |||
Property / part of: lock picking / rank | |||
Normal rank |
Latest revision as of 14:59, 26 February 2023
the protection of computer systems and networks from theft, damage, زmisuse or data leak
- IT security
- Information technology security
- Cyber security
- cybersecurity
Language | Label | Description | Also known as |
---|---|---|---|
English | computer security |
the protection of computer systems and networks from theft, damage, زmisuse or data leak |
|