Security/Related Articles: Difference between revisions
< Security
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: {{subpages}} {{TOC|right}} ==Parent topics== {{r|article}} {{r|Formal Title}} --> ==Subtopics== {{r|Information assurance}} {{r|Computer security||**}} {{r|Communications security||**}}...) |
No edit summary |
||
(One intermediate revision by one other user not shown) | |||
Line 3: | Line 3: | ||
{{TOC|right}} | {{TOC|right}} | ||
==Parent topics== | ==Parent topics== | ||
{{r| | {{r|Auditing}} | ||
{{r| | {{r|Law}} | ||
==Subtopics== | ==Subtopics== | ||
{{r|Information assurance}} | {{r|Information assurance}} | ||
Line 16: | Line 15: | ||
==Other related topics== | ==Other related topics== | ||
{{r|Accounting}} | {{r|Accounting}} | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Domain Name System security}} | |||
{{r|Urinary tract infections}} | |||
{{r|Spyware}} |
Latest revision as of 16:00, 16 October 2024
- See also changes related to Security, or pages that link to Security or to this page or whose text contains "Security".
Parent topics
- Auditing [r]: Add brief definition or description
- Law [r]: Body of rules of conduct of binding legal force and effect, prescribed, recognized, and enforced by a controlling authority. [e]
Subtopics
- Information assurance [r]: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
- Computer security [r]: Computer security is a branch of technology known as information security as applied to computers. [e]
- Communications security [r]: Add brief definition or description
- Classified information [r]: Material collected or created by a government that is subject to limitations on its release to the general public and may have penalties for its unauthorized release. [e]
- Physical security [r]: Add brief definition or description
- Accounting [r]: The process of recording transactions within a business, almost always the double-entry method today. [e]
- Domain Name System security [r]: A set of extensions to the Domain Name System to protect it from security threats known at the time [e]
- Urinary tract infections [r]: Infections, most frequently caused by bacteria, which cause an inflammatory response in epithelial cells of the urinary tract [e]
- Spyware [r]: Malicious software that offers you services or may infiltrate quietly, and then clandestinely steals your personal details. [e]