Search results

Jump to navigation Jump to search

Page title matches

  • ...as [[information security]] as applied to [[computer]]s. The objective of computer security varies and can include protection of information from theft or corruption, ...ert negative requirements to positive enforceable rules. For this reason, computer security is often more technical and mathematical than some [[computer science]] fie
    2 KB (267 words) - 05:49, 8 April 2024
  • ...rdered chaos" though so I don't know how receptive people would be to it. "Computer security" is huge... I just wanted to get a little stub going with the hopes it woul
    2 KB (269 words) - 08:11, 4 May 2024
  • | pagename = Computer security | abc = Computer security
    2 KB (231 words) - 11:35, 27 February 2010
  • '''Computer security ''' is a branch of technology known as [[information security]] as applied
    149 bytes (20 words) - 11:59, 22 June 2008
  • Auto-populated based on [[Special:WhatLinksHere/Computer security]]. Needs checking by a human.
    815 bytes (100 words) - 15:37, 11 January 2010

Page text matches

  • '''Computer security ''' is a branch of technology known as [[information security]] as applied
    149 bytes (20 words) - 11:59, 22 June 2008
  • The combination of [[computer security]], [[communications security]], [[auditing]] and administrative controls su
    234 bytes (24 words) - 14:55, 26 February 2010
  • ...ecurity''', is a broad term that includes both communications security and computer security, along with the appropriate administrative infrastructure for personnel and ==Computer security==
    2 KB (232 words) - 16:21, 30 March 2024
  • ...as [[information security]] as applied to [[computer]]s. The objective of computer security varies and can include protection of information from theft or corruption, ...ert negative requirements to positive enforceable rules. For this reason, computer security is often more technical and mathematical than some [[computer science]] fie
    2 KB (267 words) - 05:49, 8 April 2024
  • ...logical acceptability was proposed as one of the [[design patterns]] for [[computer security]] by Jerome Saltzer and Michael Schroeder in their seminal paper ''The Prot
    898 bytes (132 words) - 05:49, 8 April 2024
  • ...mous paper on Internet worms. My current interest is the interface between computer security and humans, especially users (touching on HCI and psychology).
    561 bytes (90 words) - 04:49, 22 November 2023
  • ...]. My interests include [[computers]] (in particular, [[cryptography]], [[computer security]], and [[programming]]), [[computer|computer game]], [[pen and paper|Pen an
    486 bytes (57 words) - 03:45, 22 November 2023
  • ...curity researcher. I have written and published articles in the field of computer security.
    625 bytes (95 words) - 03:48, 22 November 2023
  • Auto-populated based on [[Special:WhatLinksHere/Computer security]]. Needs checking by a human.
    815 bytes (100 words) - 15:37, 11 January 2010
  • {{r|Computer security||**}}
    316 bytes (34 words) - 10:56, 27 February 2010
  • * Pipkin, Donald L. Halting the Hacker: A Practical Guide to Computer Security (with CD-ROM). Indianapolis: Prentice Hall PTR, 2002.
    354 bytes (46 words) - 20:40, 12 September 2013
  • ...from Germany. My interests are computers (software, hardware, programming, computer security), some natural sciences and Music.
    531 bytes (65 words) - 04:43, 22 November 2023
  • ...s on computer security and being a regular presenter at local and national computer security conferences. Mr. Klein Keane maintains an active personal website at http:
    2 KB (251 words) - 04:10, 22 November 2023
  • I am a computer security specialist, with a deep interest in food and cooking.
    134 bytes (20 words) - 03:49, 22 November 2023
  • A computer security expert who was awared the [[Wes Graham Award]] by his alma mater, the [[Uni
    161 bytes (23 words) - 20:35, 19 May 2022
  • In computers and computer security, occurs when more data is written to a memory buffer than can fit into the
    160 bytes (25 words) - 23:56, 29 June 2009
  • {{r|Computer security||***}}
    558 bytes (70 words) - 14:29, 26 February 2010
  • I have diploma qualification in computer security and have experiences in technology related career. Having knowledgeable und
    458 bytes (64 words) - 05:58, 6 May 2023
  • '''Jon Callas''' is a computer security expert best known for work related to PGP. He has a rather out-of-date [htt
    744 bytes (121 words) - 07:31, 18 March 2024
  • In computer security, a program that a user is induced to run deliberately for some apparently d
    207 bytes (32 words) - 22:58, 23 February 2009
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)