Matches in DBpedia 2014 for { ?s ?p <http://dbpedia.org/resource/Category:Computer_security_procedures> . }
Showing items 1 to 79 of
79
with 100 items per page.
- AAA_protocol subject Category:Computer_security_procedures.
- Automated_information_systems_security subject Category:Computer_security_procedures.
- CBL_Index subject Category:Computer_security_procedures.
- CESG_Claims_Tested_Mark subject Category:Computer_security_procedures.
- Canary_trap subject Category:Computer_security_procedures.
- Chroot subject Category:Computer_security_procedures.
- Commercial_Product_Assurance subject Category:Computer_security_procedures.
- Common_Criteria_Testing_Laboratory subject Category:Computer_security_procedures.
- Composite_Blocking_List subject Category:Computer_security_procedures.
- Computer_Underground_Digest subject Category:Computer_security_procedures.
- Computer_forensics subject Category:Computer_security_procedures.
- Computer_security_policy subject Category:Computer_security_procedures.
- Control_system_security subject Category:Computer_security_procedures.
- Cryptographic_Module_Testing_Laboratory subject Category:Computer_security_procedures.
- Cyber-collection subject Category:Computer_security_procedures.
- Cyber-security_regulation subject Category:Computer_security_procedures.
- Cyber_security_standards subject Category:Computer_security_procedures.
- Cyber_spying subject Category:Computer_security_procedures.
- Cyberwarfare subject Category:Computer_security_procedures.
- DShield subject Category:Computer_security_procedures.
- Defense_in_depth_(computing) subject Category:Computer_security_procedures.
- Department_of_Defense_Information_Assurance_Certification_and_Accreditation_Process subject Category:Computer_security_procedures.
- Differentiated_security subject Category:Computer_security_procedures.
- Dynablock subject Category:Computer_security_procedures.
- Enterprise_Privacy_Authorization_Language subject Category:Computer_security_procedures.
- Evaluation_Assurance_Level subject Category:Computer_security_procedures.
- Exit_procedure subject Category:Computer_security_procedures.
- F._Lynn_McNulty subject Category:Computer_security_procedures.
- File_system_permissions subject Category:Computer_security_procedures.
- Full_disclosure_(computer_security) subject Category:Computer_security_procedures.
- Fuzz_testing subject Category:Computer_security_procedures.
- Google_hacking subject Category:Computer_security_procedures.
- Hardening_(computing) subject Category:Computer_security_procedures.
- Host_protected_area subject Category:Computer_security_procedures.
- Identity_management subject Category:Computer_security_procedures.
- Information_technology_security_audit subject Category:Computer_security_procedures.
- Intruder_detection subject Category:Computer_security_procedures.
- Labeled_Security_Protection_Profile subject Category:Computer_security_procedures.
- Lock_screen subject Category:Computer_security_procedures.
- Long-term_support subject Category:Computer_security_procedures.
- Mobile_device_forensics subject Category:Computer_security_procedures.
- National_Information_Assurance_Certification_and_Accreditation_Process subject Category:Computer_security_procedures.
- National_Information_Assurance_Training_and_Education_Center subject Category:Computer_security_procedures.
- National_Strategy_to_Secure_Cyberspace subject Category:Computer_security_procedures.
- Need_to_know subject Category:Computer_security_procedures.
- Network_security_policy subject Category:Computer_security_procedures.
- Not_Just_Another_Bogus_List subject Category:Computer_security_procedures.
- Off-site_data_protection subject Category:Computer_security_procedures.
- Open_Vulnerability_and_Assessment_Language subject Category:Computer_security_procedures.
- Patch_Tuesday subject Category:Computer_security_procedures.
- Penetration_test subject Category:Computer_security_procedures.
- Presidential_Policy_Directive_20 subject Category:Computer_security_procedures.
- Privilege_bracketing subject Category:Computer_security_procedures.
- Privilege_revocation_(computing) subject Category:Computer_security_procedures.
- Privilege_separation subject Category:Computer_security_procedures.
- Protection_Profile subject Category:Computer_security_procedures.
- Protection_mechanism subject Category:Computer_security_procedures.
- RISKS_Digest subject Category:Computer_security_procedures.
- Responsible_disclosure subject Category:Computer_security_procedures.
- Same-origin_policy subject Category:Computer_security_procedures.
- Secure_attention_key subject Category:Computer_security_procedures.
- Secure_by_default subject Category:Computer_security_procedures.
- Secure_by_design subject Category:Computer_security_procedures.
- Security-evaluated_operating_system subject Category:Computer_security_procedures.
- Security_Content_Automation_Protocol subject Category:Computer_security_procedures.
- Security_Target subject Category:Computer_security_procedures.
- Security_controls subject Category:Computer_security_procedures.
- Security_management subject Category:Computer_security_procedures.
- Security_through_obscurity subject Category:Computer_security_procedures.
- Setuid subject Category:Computer_security_procedures.
- Software_forensics subject Category:Computer_security_procedures.
- System_high_mode subject Category:Computer_security_procedures.
- Trusted_computing_base subject Category:Computer_security_procedures.
- Vulnerability_management subject Category:Computer_security_procedures.
- XACML subject Category:Computer_security_procedures.
- XTS-400 subject Category:Computer_security_procedures.
- Category:Computer_security_accreditations broader Category:Computer_security_procedures.
- Category:Computer_security_qualifications broader Category:Computer_security_procedures.
- Category:Computer_security_standards broader Category:Computer_security_procedures.