Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
Other:
CSV
JSON-LD
Faceted Browser
Sparql Endpoint
About:
Computer security procedures
An Entity of Type:
Concept
,
from Named Graph:
http://dbpedia.org
,
within Data Space:
dbpedia.org
Property
Value
dbo:
wikiPageID
4652476
(xsd:integer)
dbo:
wikiPageRevisionID
905601381
(xsd:integer)
dbp:
wikiPageUsesTemplate
dbt
:Catdiffuse
rdf:
type
skos
:Concept
rdfs:
label
Computer security procedures
(en)
skos:
broader
dbc
:Procedural_knowledge
dbc
:Computer_security
skos:
prefLabel
Computer security procedures
(en)
prov:
wasDerivedFrom
wikipedia-en
:Category:Computer_security_procedures?oldid=905601381&ns=14
is
dbo:
wikiPageWikiLink
of
dbr
:Proof_of_secure_erasure
dbr
:Enterprise_Privacy_Authorization_Language
dbr
:NIS_Directive
dbr
:Network_security_policy
dbr
:Patch_Tuesday
dbr
:Privilege_separation
dbr
:Security_management
dbr
:Cyber-collection
dbr
:Cyber-security_regulation
dbr
:Cyber_resilience
dbr
:Cyber_spying
dbr
:Cyber_threat_hunting
dbr
:Cyberwarfare
dbr
:Defense_in_depth_(computing)
dbr
:Information_security_audit
dbr
:Intruder_detection
dbr
:Presidential_Policy_Directive_20
dbr
:Protection_Profile
dbr
:Protection_mechanism
dbr
:Not_Just_Another_Bogus_List
dbr
:Computer_Underground_Digest
dbr
:Need_to_know
dbr
:Off-site_data_protection
dbr
:Open_Vulnerability_and_Assessment_Language
dbr
:Same-origin_policy
dbr
:Security_through_obscurity
dbr
:Chroot
dbr
:Control_system_security
dbr
:Coordinated_vulnerability_disclosure
dbr
:Cryptographic_Module_Testing_Laboratory
dbr
:Vulnerability_management
dbr
:Commercial_Product_Assurance
dbr
:Common_Criteria_Testing_Laboratory
dbr
:Composite_Blocking_List
dbr
:Computer_forensics
dbr
:Computer_security_policy
dbr
:Full_disclosure_(computer_security)
dbr
:Host_protected_area
dbr
:Identity_management
dbr
:Secure_attention_key
dbr
:Setuid
dbr
:Trusted_computing_base
dbr
:AddressSanitizer
dbr
:Lock_screen
dbr
:Long-term_support
dbr
:DShield
dbr
:Differentiated_security
dbr
:Google_hacking
dbr
:Hardening_(computing)
dbr
:Security_controls
dbr
:Privilege_revocation_(computing)
dbr
:Risk_Management_Framework
dbr
:AAA_(computer_security)
dbr
:XTS-400
dbr
:Mobile_device_forensics
dbr
:System_high_mode
dbr
:Automated_information_systems_security
dbr
:CBL_Index
dbr
:CESG_Claims_Tested_Mark
dbr
:Software_forensics
dbr
:Offensive_Security
dbr
:RISKS_Digest
dbr
:XACML
dbr
:Secure_by_design
dbr
:Unified_access_management
dbr
:Unified_threat_management
dbr
:F._Lynn_McNulty
dbr
:IT_security_standards
dbr
:Security-evaluated_operating_system
dbr
:Evaluation_Assurance_Level
dbr
:National_Information_Assurance_Training_and_Education_Center
dbr
:National_Strategy_to_Secure_Cyberspace
dbr
:Secure_by_default
dbr
:Security_Target
dbr
:Privilege_bracketing
is
dcterms:
subject
of
dbr
:Proof_of_secure_erasure
dbr
:Enterprise_Privacy_Authorization_Language
dbr
:NIS_Directive
dbr
:Network_security_policy
dbr
:Patch_Tuesday
dbr
:Privilege_separation
dbr
:Security_management
dbr
:Cyber-collection
dbr
:Cyber-security_regulation
dbr
:Cyber_resilience
dbr
:Cyber_spying
dbr
:Cyber_threat_hunting
dbr
:Cyberwarfare
dbr
:Defense_in_depth_(computing)
dbr
:Information_security_audit
dbr
:Intruder_detection
dbr
:Presidential_Policy_Directive_20
dbr
:Protection_Profile
dbr
:Protection_mechanism
dbr
:Not_Just_Another_Bogus_List
dbr
:Computer_Underground_Digest
dbr
:Need_to_know
dbr
:Off-site_data_protection
dbr
:Open_Vulnerability_and_Assessment_Language
dbr
:Same-origin_policy
dbr
:Security_through_obscurity
dbr
:Chroot
dbr
:Control_system_security
dbr
:Coordinated_vulnerability_disclosure
dbr
:Cryptographic_Module_Testing_Laboratory
dbr
:Vulnerability_management
dbr
:Commercial_Product_Assurance
dbr
:Common_Criteria_Testing_Laboratory
dbr
:Composite_Blocking_List
dbr
:Computer_forensics
dbr
:Computer_security_policy
dbr
:Full_disclosure_(computer_security)
dbr
:Host_protected_area
dbr
:Identity_management
dbr
:Secure_attention_key
dbr
:Setuid
dbr
:Trusted_computing_base
dbr
:AddressSanitizer
dbr
:Lock_screen
dbr
:Long-term_support
dbr
:DShield
dbr
:Differentiated_security
dbr
:Google_hacking
dbr
:Hardening_(computing)
dbr
:Security_controls
dbr
:Privilege_revocation_(computing)
dbr
:Risk_Management_Framework
dbr
:AAA_(computer_security)
dbr
:XTS-400
dbr
:Mobile_device_forensics
dbr
:System_high_mode
dbr
:Automated_information_systems_security
dbr
:CBL_Index
dbr
:CESG_Claims_Tested_Mark
dbr
:Software_forensics
dbr
:Offensive_Security
dbr
:RISKS_Digest
dbr
:XACML
dbr
:Secure_by_design
dbr
:Unified_access_management
dbr
:Unified_threat_management
dbr
:F._Lynn_McNulty
dbr
:IT_security_standards
dbr
:Security-evaluated_operating_system
dbr
:Evaluation_Assurance_Level
dbr
:National_Information_Assurance_Training_and_Education_Center
dbr
:National_Strategy_to_Secure_Cyberspace
dbr
:Secure_by_default
dbr
:Security_Target
dbr
:Privilege_bracketing
is
skos:
broader
of
dbc
:Security_testing
dbc
:File_system_permissions
dbc
:Computer_security_accreditations
dbc
:Computer_security_qualifications
This content was extracted from
Wikipedia
and is licensed under the
Creative Commons Attribution-ShareAlike 3.0 Unported License