Matches in DBpedia 2014 for { <http://dbpedia.org/resource/Exploit_(computer_security)> ?p ?o. }
Showing items 1 to 44 of
44
with 100 items per page.
- Exploit_(computer_security) abstract "An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack.".
- Exploit_(computer_security) wikiPageID "9875".
- Exploit_(computer_security) wikiPageRevisionID "605055526".
- Exploit_(computer_security) hasPhotoCollection Exploit_(computer_security).
- Exploit_(computer_security) subject Category:Computer_security_exploits.
- Exploit_(computer_security) type Abstraction100002137.
- Exploit_(computer_security) type Accomplishment100035189.
- Exploit_(computer_security) type Act100030358.
- Exploit_(computer_security) type Action100037396.
- Exploit_(computer_security) type ComputerSecurityExploits.
- Exploit_(computer_security) type Event100029378.
- Exploit_(computer_security) type Feat100036762.
- Exploit_(computer_security) type PsychologicalFeature100023100.
- Exploit_(computer_security) type YagoPermanentlyLocatedEntity.
- Exploit_(computer_security) comment "An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).".
- Exploit_(computer_security) label "Exploit (computer security)".
- Exploit_(computer_security) label "Exploit (computerbeveiliging)".
- Exploit_(computer_security) label "Exploit (informatique)".
- Exploit_(computer_security) label "Exploit".
- Exploit_(computer_security) label "Exploit".
- Exploit_(computer_security) label "Exploit".
- Exploit_(computer_security) label "Exploit".
- Exploit_(computer_security) label "Exploit".
- Exploit_(computer_security) label "Эксплойт".
- Exploit_(computer_security) label "إكسبلويت (أمن الحاسوب)".
- Exploit_(computer_security) label "エクスプロイト".
- Exploit_(computer_security) sameAs Exploit.
- Exploit_(computer_security) sameAs Exploit.
- Exploit_(computer_security) sameAs Exploit.
- Exploit_(computer_security) sameAs Exploit.
- Exploit_(computer_security) sameAs Exploit_(informatique).
- Exploit_(computer_security) sameAs Exploit.
- Exploit_(computer_security) sameAs Exploit.
- Exploit_(computer_security) sameAs エクスプロイト.
- Exploit_(computer_security) sameAs 취약점_공격.
- Exploit_(computer_security) sameAs Exploit_(computerbeveiliging).
- Exploit_(computer_security) sameAs Exploit.
- Exploit_(computer_security) sameAs Exploit_(segurança_de_computadores).
- Exploit_(computer_security) sameAs m.02ph2.
- Exploit_(computer_security) sameAs Q11287.
- Exploit_(computer_security) sameAs Q11287.
- Exploit_(computer_security) sameAs Exploit_(computer_security).
- Exploit_(computer_security) wasDerivedFrom Exploit_(computer_security)?oldid=605055526.
- Exploit_(computer_security) isPrimaryTopicOf Exploit_(computer_security).