Search results

Jump to navigation Jump to search

Page title matches

  • ...as [[information security]] as applied to [[computer]]s. The objective of computer security varies and can include protection of information from theft or corruption, ...ert negative requirements to positive enforceable rules. For this reason, computer security is often more technical and mathematical than some [[computer science]] fie
    2 KB (267 words) - 05:49, 8 April 2024
  • '''Computer security ''' is a branch of technology known as [[information security]] as applied
    149 bytes (20 words) - 11:59, 22 June 2008
  • Auto-populated based on [[Special:WhatLinksHere/Computer security]]. Needs checking by a human.
    815 bytes (100 words) - 15:37, 11 January 2010

Page text matches

  • '''Computer security ''' is a branch of technology known as [[information security]] as applied
    149 bytes (20 words) - 11:59, 22 June 2008
  • The combination of [[computer security]], [[communications security]], [[auditing]] and administrative controls su
    234 bytes (24 words) - 14:55, 26 February 2010
  • ...ecurity''', is a broad term that includes both communications security and computer security, along with the appropriate administrative infrastructure for personnel and ==Computer security==
    2 KB (232 words) - 16:21, 30 March 2024
  • ...as [[information security]] as applied to [[computer]]s. The objective of computer security varies and can include protection of information from theft or corruption, ...ert negative requirements to positive enforceable rules. For this reason, computer security is often more technical and mathematical than some [[computer science]] fie
    2 KB (267 words) - 05:49, 8 April 2024
  • ...logical acceptability was proposed as one of the [[design patterns]] for [[computer security]] by Jerome Saltzer and Michael Schroeder in their seminal paper ''The Prot
    898 bytes (132 words) - 05:49, 8 April 2024
  • Auto-populated based on [[Special:WhatLinksHere/Computer security]]. Needs checking by a human.
    815 bytes (100 words) - 15:37, 11 January 2010
  • {{r|Computer security||**}}
    316 bytes (34 words) - 10:56, 27 February 2010
  • * Pipkin, Donald L. Halting the Hacker: A Practical Guide to Computer Security (with CD-ROM). Indianapolis: Prentice Hall PTR, 2002.
    354 bytes (46 words) - 20:40, 12 September 2013
  • A computer security expert who was awared the [[Wes Graham Award]] by his alma mater, the [[Uni
    161 bytes (23 words) - 20:35, 19 May 2022
  • In computers and computer security, occurs when more data is written to a memory buffer than can fit into the
    160 bytes (25 words) - 23:56, 29 June 2009
  • {{r|Computer security||***}}
    558 bytes (70 words) - 14:29, 26 February 2010
  • '''Jon Callas''' is a computer security expert best known for work related to PGP. He has a rather out-of-date [htt
    744 bytes (121 words) - 07:31, 18 March 2024
  • In computer security, a program that a user is induced to run deliberately for some apparently d
    207 bytes (32 words) - 22:58, 23 February 2009
  • The act of releasing computer security vulnerability details without first informing vendors or allowing a patch f
    267 bytes (38 words) - 17:09, 21 July 2010
  • ...whether that information be generated by computers or not. It complements computer security, which protects information in computers.
    650 bytes (95 words) - 16:22, 30 March 2024
  • Marcus Ranum is a computer security expert. As of mid-2010, he is at [[Tenable Security]].
    596 bytes (83 words) - 05:48, 8 April 2024
  • Steve Bellovin is a computer security expert who was at Bell Labs for many years and is currently (2010) at Colum
    2 KB (259 words) - 07:37, 18 March 2024
  • {{r|Computer security}}
    3 KB (353 words) - 03:48, 24 September 2013
  • ...or accepted guidelines exist. Full disclosure is the policy of releasing computer security vulnerability details (and associated exploit code) to the internet without
    2 KB (274 words) - 05:48, 8 April 2024
  • In the context of computer security, a '''virus''' is a piece of malicious [[software]] (i.e., [[malware]]) tha
    4 KB (577 words) - 05:48, 8 April 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)