Security/Related Articles: Difference between revisions
< Security
Jump to navigation
Jump to search
imported>Howard C. Berkowitz No edit summary |
No edit summary |
||
Line 17: | Line 17: | ||
{{r|Accounting}} | {{r|Accounting}} | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Domain Name System security}} | |||
{{r|Urinary tract infections}} | |||
{{r|Spyware}} |
Latest revision as of 16:00, 16 October 2024
- See also changes related to Security, or pages that link to Security or to this page or whose text contains "Security".
Parent topics
- Auditing [r]: Add brief definition or description
- Law [r]: Body of rules of conduct of binding legal force and effect, prescribed, recognized, and enforced by a controlling authority. [e]
Subtopics
- Information assurance [r]: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
- Computer security [r]: Computer security is a branch of technology known as information security as applied to computers. [e]
- Communications security [r]: Add brief definition or description
- Classified information [r]: Material collected or created by a government that is subject to limitations on its release to the general public and may have penalties for its unauthorized release. [e]
- Physical security [r]: Add brief definition or description
- Accounting [r]: The process of recording transactions within a business, almost always the double-entry method today. [e]
- Domain Name System security [r]: A set of extensions to the Domain Name System to protect it from security threats known at the time [e]
- Urinary tract infections [r]: Infections, most frequently caused by bacteria, which cause an inflammatory response in epithelial cells of the urinary tract [e]
- Spyware [r]: Malicious software that offers you services or may infiltrate quietly, and then clandestinely steals your personal details. [e]