Search results
Jump to navigation
Jump to search
- ...erally both more security-conscious than end users and more able to follow computer security procedures. If not, at least there are fewer of them to educate or replace.40 KB (6,219 words) - 05:49, 8 April 2024
- ...that grew out of it. ... Seemingly every major figure in cryptography and computer security has passed through the list from time to time.<ref>{{citation35 KB (5,430 words) - 07:27, 18 March 2024
- ...ranch of information operations, which includes technical measures such as computer security and attacking hostile computers, but also "soft" disciplines such as psycho30 KB (4,571 words) - 06:56, 4 April 2024