Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
Other:
CSV
JSON-LD
Faceted Browser
Sparql Endpoint
About:
http://dbpedia.org/resource/Template:Computer-security-stub
An Entity of Type:
Thing
,
from Named Graph:
http://dbpedia.org
,
within Data Space:
dbpedia.org
Property
Value
dbo:
wikiPageID
30858068
(xsd:integer)
dbo:
wikiPageRevisionID
546099807
(xsd:integer)
dbp:
wikiPageUsesTemplate
dbt
:Asbox
prov:
wasDerivedFrom
wikipedia-en
:Template:Computer-security-stub?oldid=546099807&ns=10
is
dbo:
wikiPageRedirects
of
dbt
:Security-stub
is
dbp:
wikiPageUsesTemplate
of
dbr
:PrintNightmare
dbr
:Qiui
dbr
:Memory_ProteXion
dbr
:Trust_boundary
dbr
:AppArmor_Mobile
dbr
:BeyondCorp
dbr
:Cyber_range
dbr
:Cyclops_Blink
dbr
:DREAD_(risk_assessment_model)
dbr
:Donbot_botnet
dbr
:Duqu_2.0
dbr
:Information_Card_Foundation
dbr
:Information_security_standards
dbr
:Initiative_for_Open_Authentication
dbr
:Insecure_direct_object_reference
dbr
:Interactive_application_security_testing
dbr
:Internet_Crime_Complaint_Center
dbr
:JIT_spraying
dbr
:Light-weight_Identity
dbr
:Resource_Access_Control_Facility
dbr
:Securax
dbr
:Geoplexing
dbr
:System_Reconfiguration_Attacks
dbr
:Quadream
dbr
:Ghostwriter_(hacker_group)
dbr
:Bot_herder
dbr
:Controlled_Access_Protection_Profile
dbr
:Cookiemonster_attack
dbr
:Cryptographic_log_on
dbr
:Operation_Shady_RAT
dbr
:Macaroons_(computer_science)
dbr
:Cache_poisoning
dbr
:China_Chopper
dbr
:SigSpoof
dbr
:Stacheldraht
dbr
:Clef_(app)
dbr
:Commission_on_Enhancing_National_Cybersecurity
dbr
:Common_Attack_Pattern_Enumeration_and_Classification
dbr
:Computer_Crime_and_Intellectual_Property_Section
dbr
:Computer_lock
dbr
:Democratic_Congressional_Campaign_Committee_cyber_attacks
dbr
:Emergency_Data_Request
dbr
:Federal_Service_for_Technical_and_Export_Control
dbr
:Full_disclosure_(mailing_list)
dbr
:Hardware_functionality_scan
dbr
:Trust_no_one_(Internet_security)
dbr
:Microsoft_Support_Diagnostic_Tool
dbr
:Active_defense
dbr
:Data_Security_Threats_Database
dbr
:Data_diddling
dbr
:Database_audit
dbr
:WabiSabiLabi
dbr
:WarVOX
dbr
:Drovorub
dbr
:Gameover_ZeuS
dbr
:Heap_feng_shui
dbr
:Japan_Vulnerability_Notes
dbr
:Lattice-based_access_control
dbr
:Lazy_FP_state_restore
dbr
:Location-based_authentication
dbr
:APT40
dbr
:Algorithmic_complexity_attack
dbr
:Data_Security_Council_of_India
dbr
:ELearnSecurity
dbr
:FIPS_199
dbr
:FORCEDENTRY
dbr
:Follina_(security_vulnerability)
dbr
:Bank_Verification_Number
dbr
:Banner_grabbing
dbr
:Bring_your_own_encryption
dbr
:Pacman_(security_vulnerability)
dbr
:FoxBlade
dbr
:GnosticPlayers
dbr
:Grandmaster_Ratte'
dbr
:Handwritten_biometric_recognition
dbr
:Kenzero
dbr
:Kimsuky
dbr
:Hack.lu
dbr
:Hi-Tech_Crime_Enquiry_Cell
dbr
:Atdmt
dbr
:U-Prove
dbr
:Atomic_authorization
dbr
:ADISA_certification
dbr
:ATT&CK
dbr
:Account_pre-hijacking
dbr
:Chinese_National_Vulnerability_Database
dbr
:Bitsquatting
dbr
:Black_hat_(computer_security)
dbr
:Ekoparty
dbr
:High-water_mark_(computer_security)
dbr
:Java_KeyStore
dbr
:Ticket_(IT_security)
dbr
:Twinge_attack
dbr
:Software_taggant
dbr
:Authenticated_Key_Exchange
dbr
:Bootstrapable_builds
dbr
:Buffer_over-read
dbr
:Spoiler_(security_vulnerability)
dbr
:Grayshift
dbr
:IVPN
dbr
:OpenIDM
dbr
:Certified_Computer_Examiner
dbr
:Secure_transmission
dbr
:Security_information_management
dbr
:Kippo
dbr
:Operation_Cyber_Condition_Zebra
dbr
:Masque_Attack
dbr
:Server-side_request_forgery
dbr
:VENOM
dbr
:Vulnerabilities_Equities_Process
dbr
:WARP_(information_security)
dbr
:Night_Dragon_Operation
dbr
:ISO/IEC_7064
dbr
:Password_length_parameter
dbr
:VPNBook
dbr
:Firewalk_(computing)
dbr
:Gigabyte_(virus_writer)
dbr
:Telehack
dbr
:National_Information_Assurance_Certification_and_Accreditation_Process
dbr
:National_Information_Assurance_Training_and_Education_Center
dbr
:National_Initiative_for_Cybersecurity_Careers_and_Studies
dbr
:Site_Security_Handbook
dbr
:Multisignature
dbr
:VOMS
dbr
:Ping_flood
dbr
:TUPAS
dbr
:Security_BSides
dbr
:Security_and_Privacy_in_Computer_Systems
dbr
:Ware_report
dbr
:Privilege_bracketing
dbr
:Reproducible_builds
dbr
:Resource_exhaustion_attack
dbr
:Safe@Office
dbr
:Trust_anchor
dbr
:Wilmagate
dbr
:TunnelBear
dbr
:Team_Xecuter
This content was extracted from
Wikipedia
and is licensed under the
Creative Commons Attribution-ShareAlike 3.0 Unported License