Matches in DBpedia 2014 for { ?s ?p <http://dbpedia.org/class/yago/ComputerSecurityProcedures> . }
Showing items 1 to 64 of
64
with 100 items per page.
- AAA_protocol type ComputerSecurityProcedures.
- Automated_information_systems_security type ComputerSecurityProcedures.
- CBL_Index type ComputerSecurityProcedures.
- CESG_Claims_Tested_Mark type ComputerSecurityProcedures.
- Canary_trap type ComputerSecurityProcedures.
- Chroot type ComputerSecurityProcedures.
- Commercial_Product_Assurance type ComputerSecurityProcedures.
- Common_Criteria_Testing_Laboratory type ComputerSecurityProcedures.
- Composite_Blocking_List type ComputerSecurityProcedures.
- Computer_forensics type ComputerSecurityProcedures.
- Control_system_security type ComputerSecurityProcedures.
- Cryptographic_Module_Testing_Laboratory type ComputerSecurityProcedures.
- Cyber-security_regulation type ComputerSecurityProcedures.
- Cyber_security_standards type ComputerSecurityProcedures.
- Cyber_spying type ComputerSecurityProcedures.
- DShield type ComputerSecurityProcedures.
- Defense_in_depth_(computing) type ComputerSecurityProcedures.
- Differentiated_security type ComputerSecurityProcedures.
- Dynablock type ComputerSecurityProcedures.
- Enterprise_Privacy_Authorization_Language type ComputerSecurityProcedures.
- Evaluation_Assurance_Level type ComputerSecurityProcedures.
- Exit_procedure type ComputerSecurityProcedures.
- Filesystem_permissions type ComputerSecurityProcedures.
- Full_disclosure type ComputerSecurityProcedures.
- Fuzz_testing type ComputerSecurityProcedures.
- Google_hacking type ComputerSecurityProcedures.
- Hardening_(computing) type ComputerSecurityProcedures.
- Host_protected_area type ComputerSecurityProcedures.
- Identity_management type ComputerSecurityProcedures.
- Information_technology_security_audit type ComputerSecurityProcedures.
- Internet_ethics type ComputerSecurityProcedures.
- Intruder_detection type ComputerSecurityProcedures.
- Labeled_Security_Protection_Profile type ComputerSecurityProcedures.
- National_Strategy_to_Secure_Cyberspace type ComputerSecurityProcedures.
- Need_to_know type ComputerSecurityProcedures.
- Network_security_policy type ComputerSecurityProcedures.
- Not_Just_Another_Bogus_List type ComputerSecurityProcedures.
- Off-site_data_protection type ComputerSecurityProcedures.
- Patch_Tuesday type ComputerSecurityProcedures.
- Penetration_test type ComputerSecurityProcedures.
- Presumed_security type ComputerSecurityProcedures.
- Privilege_revocation type ComputerSecurityProcedures.
- Privilege_separation type ComputerSecurityProcedures.
- Protection_Profile type ComputerSecurityProcedures.
- Responsible_disclosure type ComputerSecurityProcedures.
- Same_origin_policy type ComputerSecurityProcedures.
- Schneier's_law type ComputerSecurityProcedures.
- Secure_attention_key type ComputerSecurityProcedures.
- Secure_by_default type ComputerSecurityProcedures.
- Security-evaluated_operating_system type ComputerSecurityProcedures.
- Security_Target type ComputerSecurityProcedures.
- Security_controls type ComputerSecurityProcedures.
- Security_management type ComputerSecurityProcedures.
- Security_through_obscurity type ComputerSecurityProcedures.
- Setuid type ComputerSecurityProcedures.
- Software_forensics type ComputerSecurityProcedures.
- System_high_mode type ComputerSecurityProcedures.
- Trusted_computing_base type ComputerSecurityProcedures.
- Vulnerability_management type ComputerSecurityProcedures.
- XACML type ComputerSecurityProcedures.
- MyNetWatchman type ComputerSecurityProcedures.
- Shibboleth_(computer_security) type ComputerSecurityProcedures.
- System_Security_Authorization_Agreement type ComputerSecurityProcedures.
- Trust_negotiation type ComputerSecurityProcedures.