Toggle navigation
Faceted Browser
Sparql Endpoint
Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
LODmilla Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
CXML
CSV
JSON-LD
About:
Computer security
An Entity of Type :
Concept
, from Named Graph :
http://dbpedia.org
, within Data Space :
dbpedia.org
Property
Value
dbo:
wikiPageID
765969
(xsd:integer)
dbo:
wikiPageRevisionID
977251006
(xsd:integer)
dbp:
wikiPageUsesTemplate
dbt
:Cat_main
dbt
:Category_diffuse
dbt
:Commons_category
dbt
:CatAutoTOC
rdf:
type
skos
:Concept
rdfs:
label
Computer security
(en)
skos:
broader
dbc
:Weapons_countermeasures
dbc
:Cybercrime
dbc
:Cyberwarfare
dbc
:Subfields_of_computer_science
dbc
:Secure_communication
dbc
:Crime_prevention
dbc
:Security_engineering
dbc
:Security_technology
skos:
prefLabel
Computer security
(en)
skos:
related
dbc
:Computer_security_exploits
prov:
wasDerivedFrom
wikipedia-en
:Category:Computer_security?oldid=977251006&ns=14
is
dbo:
wikiPageWikiLink
of
dbr
:AMD_Platform_Security_Processor
dbr
:Content_Disarm_&_Reconstruction
dbr
:Control-flow_integrity
dbr
:Control_system_security
dbr
:Usage_of_job_applications_by_hackers
dbr
:Cure53
dbr
:Cyber-collection
dbr
:CyberPatriot
dbr
:Cyber_Discovery
dbr
:Cyber_Insider_Threat
dbr
:Cyber_Intelligence_Sharing_and_Protection_Act
dbr
:Cyber_Storm_Exercise
dbr
:Cyber_Storm_II
dbr
:Cyber_Storm_III
dbr
:Cyber_security_awareness
dbr
:Cyber_spying
dbr
:Cyberattack
dbr
:Cybercrime
dbr
:Cybersecurity_Information_Sharing_Act
dbr
:Cybersex_trafficking
dbr
:Cyberwarfare
dbr
:DREAD_(risk_assessment_model)
dbr
:HTTP_Strict_Transport_Security
dbr
:Project_Sauron
dbr
:Secure_by_design
dbr
:Security_event_manager
dbr
:Sherwood_Applied_Business_Security_Architecture
dbr
:Simple_Certificate_Enrollment_Protocol
dbr
:Software_Defined_Perimeter
dbr
:Supervisor_Mode_Access_Prevention
dbr
:System_Service_Descriptor_Table
dbr
:WS-Security_based_products_and_services
dbr
:RiskIQ
dbr
:Hamza_Bendelladj
dbr
:Open-source_software_security
dbr
:List_of_security_assessment_tools
dbr
:List_of_security_hacking_incidents
dbr
:Regin_(malware)
dbr
:Security_Vision
dbr
:Supply_chain_attack
dbr
:Nitrokey
dbr
:Security.txt
dbr
:Minimum-Pairs_Protocol
dbr
:Gordon–Loeb_model
dbr
:Kon-Boot
dbr
:Project_Zero
dbr
:Public_computer
dbr
:High_Assurance_Guard
dbr
:Host_Based_Security_System
dbr
:Human–computer_interaction_(security)
dbr
:Indicator_of_compromise
dbr
:Information_assurance
dbr
:Information_assurance_vulnerability_alert
dbr
:Information_security_operations_center
dbr
:Intel_Management_Engine
dbr
:Internet_Security_Awareness_Training
dbr
:Intrusion_detection_system
dbr
:System_integrity
dbr
:Electric_grid_security
dbr
:Everykey
dbr
:Macro_and_security
dbr
:Secure_environment
dbr
:Centurion_guard
dbr
:Offensive_Security
dbr
:Checkmarx
dbr
:Digital_self-defense
dbr
:Footprinting
dbr
:Penetration_test
dbr
:Trust_on_first_use
dbr
:ERP_security
dbr
:Model-driven_security
dbr
:National_Vulnerability_Database
dbr
:User_activity_monitoring
dbr
:Non-repudiation
dbr
:Qualified_Security_Assessor
dbr
:Risk_factor_(computing)
dbr
:Runtime_application_self-protection
dbr
:Vanish_(computer_science)
dbr
:Vulnerabilities_Equities_Process
dbr
:Vulnerability_Discovery_Model
dbr
:Web_access_management
dbr
:National_Cyber_Security_Awareness_Month
dbr
:National_Cyber_Security_Policy_2013
dbr
:Army_Chief_Information_Officer/G-6
dbr
:List_of_cyber_attack_threat_trends
dbr
:List_of_data_breaches
dbr
:Dancing_pigs
dbr
:Deception_technology
dbr
:Defense_strategy_(computing)
dbr
:Defensive_computing
dbr
:Democratic_Congressional_Campaign_Committee_cyber_attacks
dbr
:Democratic_National_Committee_cyber_attacks
dbr
:EasyJet_hack
dbr
:Economics_of_security
dbr
:Ciscogate
dbr
:ITHC
dbr
:Michigan_Cyber_Range
dbr
:Physical_information_security
dbr
:Stegomalware
dbr
:Access_level
dbr
:Active_defense
dbr
:Co-managed_Security
dbr
:Anderson's_rule_(computer_science)
dbr
:HTTP_Flood
dbr
:HTTP_POST_flood
dbr
:Hacker_Bible
dbr
:Hackers.mu
dbr
:HDIV
dbr
:Hardware_backdoor
dbr
:Hardware_security
dbr
:Hardware_security_bug
dbr
:Secure_state
dbr
:WS-Trust
dbr
:Security_testing
dbr
:Zero-day_(computing)
dbr
:Smart_card_management_system
dbr
:Spanish_Cybersecurity_Research_Conference
dbr
:Spanish_Network_of_Excellence_on_Cybersecurity_Research
dbr
:Nobody_(username)
dbr
:Opal_Storage_Specification
dbr
:Privilege_Management_Infrastructure
dbr
:Proof-carrying_code
dbr
:Pwnie_Awards
dbr
:Obfuscation_(software)
dbr
:Security_information_and_event_management
dbr
:Information_security_indicators
dbr
:Operations_security
dbr
:Parkerian_Hexad
dbr
:Security_log
dbr
:Shell_Control_Box
dbr
:Outline_of_computer_security
dbr
:BeyondCorp
dbr
:Biometric_device
dbr
:BitSight
dbr
:SMBGhost_(security_vulnerability)
dbr
:Chain_of_trust
dbr
:Kill_chain
dbr
:Internet_leak
dbr
:Messaging_Layer_Security
dbr
:Principle_of_least_privilege
dbr
:Four_Horsemen_of_the_Infocalypse
dbr
:Usability_of_web_authentication_systems
dbr
:Aurora_Generator_Test
dbr
:Automotive_security
dbr
:Software-defined_protection
dbr
:Zardoz_(computer_security)
dbr
:Language-based_security
dbr
:Krebs_on_Security
dbr
:Parasitic_computing
dbr
:Ambient_authority
dbr
:Forward_anonymity
dbr
:HEAT_LANrev
dbr
:Hackers_Wanted
dbr
:AppArmor_Mobile
dbr
:Application_portfolio_attack_surface
dbr
:Application_security
dbr
:Aptum_Technologies
dbr
:Homeland_Open_Security_Technology
dbr
:Humming_Heads
dbr
:Identity-based_security
dbr
:Information_Security_Forum
dbr
:Information_sensitivity
dbr
:Insider_threat_management
dbr
:Jamf
dbr
:Seccomp
dbr
:Secure_coding
dbr
:Security_information_management
dbr
:Security_of_smart_meters
dbr
:SekChek_Local
dbr
:Information_security
dbr
:National_Collegiate_Cyber_Defense_Competition
dbr
:The_CIS_Critical_Security_Controls_for_Effective_Cyber_Defense
dbr
:Physical_access
dbr
:Relying_party
dbr
:Malware_analysis
dbr
:Titan_Rain
dbr
:Trusted_client
dbr
:Security_Protocols_Open_Repository
dbr
:Linked_timestamping
dbr
:Security_bug
dbr
:Separation_of_protection_and_security
dbr
:Microsoft_Security_Development_Lifecycle
dbr
:American_Innovation_and_Competitiveness_Act
dbr
:2018_British_Airways_cyberattack
dbr
:Bug_bounty_program
dbr
:CAPTCHA
dbr
:CPU_modes
dbr
:CSC_Version_6.0
dbr
:Resilient_control_systems
dbr
:Reverse_engineering
dbr
:Collaboration-oriented_architecture
dbr
:Collateral_freedom
dbr
:US_Cyber_Challenge
dbr
:ZeroFOX
dbr
:PRODIGAL_(computer_system)
dbr
:Access_control
dbr
:Commission_on_Enhancing_National_Cybersecurity
dbr
:Common_Vulnerabilities_and_Exposures
dbr
:Computer_Law_&_Security_Review
dbr
:Computer_and_network_surveillance
dbr
:Computer_emergency_response_team
dbr
:Computer_security_compromised_by_hardware_failure
dbr
:Computer_security_model
dbr
:Confused_deputy_problem
dbr
:Traffic_analysis
dbr
:HTTP_tunnel
dbr
:Threat_(computer)
dbr
:Trademark_(computer_security)
dbr
:Trusted_system
dbr
:Tunneling_protocol
dbr
:User_behavior_analytics
dbr
:YARA
dbr
:Fail-stop
dbr
:Security_breach_notification_laws
dbr
:Trustworthy_computing
dbr
:IASME
dbr
:IBM_4765
dbr
:IBM_4767
dbr
:IBM_4768
dbr
:IBM_4769
dbr
:INOC-DBA
dbr
:ITIL_security_management
dbr
:IT_baseline_protection
dbr
:IT_risk
dbr
:IT_risk_management
dbr
:MinID
dbr
:Intrusion_detection_system_evasion_techniques
dbr
:Intrusion_tolerance
dbr
:KeyRaider
dbr
:Software_Guard_Extensions
dbr
:WS-SecurityPolicy
dbr
:Open_security
dbr
:Secure_transmission
dbr
:Adversarial_machine_learning
dbr
:Common_Criteria_Evaluation_and_Validation_Scheme
dbr
:Computer_security
dbr
:Computer_security_incident_management
dbr
:Content_Threat_Removal
dbr
:Cowrie_(honeypot)
dbr
:Cyber_Threat_Intelligence_Integration_Center
dbr
:Cyber_and_Information_Domain_Service_(Germany)
dbr
:Cyber_risk_quantification
dbr
:Cyber_self-defense
dbr
:Cyber_threat_intelligence
dbr
:Dolev–Yao_model
dbr
:Domain_Based_Security
dbr
:Domain_fronting
dbr
:Length_extension_attack
dbr
:Trust_boundary
dbr
:Next-generation_firewall
dbr
:TLBleed
dbr
:Data_remanence
dbr
:Asset_Disposal_and_Information_Security_Alliance
dbr
:Camfecting
dbr
:Rublon
dbr
:Countermeasure_(computer)
dbr
:Crackme
dbr
:Wargame_(hacking)
dbr
:Shamoon
dbr
:Howard_Schmidt
dbr
:RFPolicy
dbr
:Kill_Pill
dbr
:Fabric_of_Security
dbr
:Federal_Desktop_Core_Configuration
dbr
:Federal_Information_Security_Management_Act_of_2002
dbr
:Federal_Information_Security_Modernization_Act_of_2014
dbr
:Standard_of_Good_Practice_for_Information_Security
dbr
:Stuxnet
dbr
:Crypto-shredding
dbr
:Cryptographic_splitting
dbr
:Trusted_timestamping
dbr
:Evasion_(network_security)
dbr
:Fidelis_Cybersecurity
dbr
:File_integrity_monitoring
dbr
:WS-Federation
dbr
:Download_Valley
dbr
:Mayfield's_paradox
dbr
:Site_Security_Handbook
dbr
:Polyinstantiation
dbr
:Supply_chain_cyber_security
dbr
:Shadow_stack
dbr
:EnCase
dbr
:Enterprise_information_security_architecture
dbr
:Anomaly_Detection_at_Multiple_Scales
dbr
:Higgins_project
dbr
:NCP_Engineering
dbr
:Security_type_system
dbr
:McAfee_Institute
dbr
:Data-centric_security
dbr
:DataSpii
dbr
:Data_commingling
dbr
:Data_diddling
dbr
:Security_controls
dbr
:Security_hacker
dbr
:Inference_attack
dbr
:Information_Exchange_Gateway
dbr
:Information_Security_Automation_Program
dbr
:Insider_threat
dbr
:Inter-protocol_exploitation
dbr
:Open_Information_Security_Maturity_Model
is
dct:
subject
of
dbr
:AMD_Platform_Security_Processor
dbr
:Content_Disarm_&_Reconstruction
dbr
:Control-flow_integrity
dbr
:Control_system_security
dbr
:Usage_of_job_applications_by_hackers
dbr
:Cure53
dbr
:Cyber-collection
dbr
:CyberPatriot
dbr
:Cyber_Discovery
dbr
:Cyber_Insider_Threat
dbr
:Cyber_Intelligence_Sharing_and_Protection_Act
dbr
:Cyber_Storm_Exercise
dbr
:Cyber_Storm_II
dbr
:Cyber_Storm_III
dbr
:Cyber_security_awareness
dbr
:Cyber_spying
dbr
:Cyberattack
dbr
:Cybercrime
dbr
:Cybersecurity_Information_Sharing_Act
dbr
:Cybersex_trafficking
dbr
:Cyberwarfare
dbr
:DREAD_(risk_assessment_model)
dbr
:HTTP_Strict_Transport_Security
dbr
:Project_Sauron
dbr
:Secure_by_design
dbr
:Security_event_manager
dbr
:Sherwood_Applied_Business_Security_Architecture
dbr
:Simple_Certificate_Enrollment_Protocol
dbr
:Software_Defined_Perimeter
dbr
:Supervisor_Mode_Access_Prevention
dbr
:System_Service_Descriptor_Table
dbr
:WS-Security_based_products_and_services
dbr
:RiskIQ
dbr
:Hamza_Bendelladj
dbr
:Open-source_software_security
dbr
:List_of_security_assessment_tools
dbr
:List_of_security_hacking_incidents
dbr
:Regin_(malware)
dbr
:Security_Vision
dbr
:Supply_chain_attack
dbr
:Nitrokey
dbr
:Security.txt
dbr
:Minimum-Pairs_Protocol
dbr
:Gordon–Loeb_model
dbr
:Kon-Boot
dbr
:Project_Zero
dbr
:Public_computer
dbr
:High_Assurance_Guard
dbr
:Host_Based_Security_System
dbr
:Human–computer_interaction_(security)
dbr
:Indicator_of_compromise
dbr
:Information_assurance
dbr
:Information_assurance_vulnerability_alert
dbr
:Information_security_operations_center
dbr
:Intel_Management_Engine
dbr
:Internet_Security_Awareness_Training
dbr
:Intrusion_detection_system
dbr
:System_integrity
dbr
:Electric_grid_security
dbr
:Everykey
dbr
:Macro_and_security
dbr
:Secure_environment
dbr
:Centurion_guard
dbr
:Offensive_Security
dbr
:Digital_self-defense
dbr
:Footprinting
dbr
:Penetration_test
dbr
:Trust_on_first_use
dbr
:ERP_security
dbr
:Model-driven_security
dbr
:National_Vulnerability_Database
dbr
:User_activity_monitoring
dbr
:Non-repudiation
dbr
:Qualified_Security_Assessor
dbr
:Risk_factor_(computing)
dbr
:Runtime_application_self-protection
dbr
:Vanish_(computer_science)
dbr
:Vulnerabilities_Equities_Process
dbr
:Vulnerability_Discovery_Model
dbr
:Web_access_management
dbr
:National_Cyber_Security_Awareness_Month
dbr
:National_Cyber_Security_Policy_2013
dbr
:Army_Chief_Information_Officer/G-6
dbr
:List_of_cyber_attack_threat_trends
dbr
:List_of_data_breaches
dbr
:Dancing_pigs
dbr
:Deception_technology
dbr
:Defense_strategy_(computing)
dbr
:Defensive_computing
dbr
:Democratic_Congressional_Campaign_Committee_cyber_attacks
dbr
:Democratic_National_Committee_cyber_attacks
dbr
:EasyJet_hack
dbr
:Economics_of_security
dbr
:ITHC
dbr
:Michigan_Cyber_Range
dbr
:Physical_information_security
dbr
:Stegomalware
dbr
:Access_level
dbr
:Active_defense
dbr
:Co-managed_Security
dbr
:Anderson's_rule_(computer_science)
dbr
:HTTP_Flood
dbr
:HTTP_POST_flood
dbr
:Hacker_Bible
dbr
:Hackers.mu
dbr
:HDIV
dbr
:Hardware_backdoor
dbr
:Hardware_security
dbr
:Hardware_security_bug
dbr
:Secure_state
dbr
:WS-Trust
dbr
:Security_testing
dbr
:Zero-day_(computing)
dbr
:Smart_card_management_system
dbr
:Spanish_Cybersecurity_Research_Conference
dbr
:Spanish_Network_of_Excellence_on_Cybersecurity_Research
dbr
:Nobody_(username)
dbr
:Opal_Storage_Specification
dbr
:Privilege_Management_Infrastructure
dbr
:Proof-carrying_code
dbr
:Pwnie_Awards
dbr
:Obfuscation_(software)
dbr
:Security_information_and_event_management
dbr
:Information_security_indicators
dbr
:Operations_security
dbr
:Parkerian_Hexad
dbr
:Security_log
dbr
:Shell_Control_Box
dbr
:Outline_of_computer_security
dbr
:BeyondCorp
dbr
:Biometric_device
dbr
:BitSight
dbr
:SMBGhost_(security_vulnerability)
dbr
:Chain_of_trust
dbr
:Kill_chain
dbr
:Internet_leak
dbr
:Messaging_Layer_Security
dbr
:Principle_of_least_privilege
dbr
:Four_Horsemen_of_the_Infocalypse
dbr
:Usability_of_web_authentication_systems
dbr
:Aurora_Generator_Test
dbr
:Automotive_security
dbr
:Software-defined_protection
dbr
:Zardoz_(computer_security)
dbr
:Language-based_security
dbr
:Krebs_on_Security
dbr
:Parasitic_computing
dbr
:Ambient_authority
dbr
:Forward_anonymity
dbr
:HEAT_LANrev
dbr
:Hackers_Wanted
dbr
:AppArmor_Mobile
dbr
:Application_portfolio_attack_surface
dbr
:Application_security
dbr
:Aptum_Technologies
dbr
:Homeland_Open_Security_Technology
dbr
:Humming_Heads
dbr
:Identity-based_security
dbr
:Information_sensitivity
dbr
:Insider_threat_management
dbr
:Jamf
dbr
:Seccomp
dbr
:Secure_coding
dbr
:Security_information_management
dbr
:Security_of_smart_meters
dbr
:SekChek_Local
dbr
:Information_security
dbr
:National_Collegiate_Cyber_Defense_Competition
dbr
:The_CIS_Critical_Security_Controls_for_Effective_Cyber_Defense
dbr
:Physical_access
dbr
:Relying_party
dbr
:Malware_analysis
dbr
:Titan_Rain
dbr
:Trusted_client
dbr
:Security_Protocols_Open_Repository
dbr
:Linked_timestamping
dbr
:Security_bug
dbr
:Separation_of_protection_and_security
dbr
:American_Innovation_and_Competitiveness_Act
dbr
:2018_British_Airways_cyberattack
dbr
:Bug_bounty_program
dbr
:CAPTCHA
dbr
:CPU_modes
dbr
:CSC_Version_6.0
dbr
:Resilient_control_systems
dbr
:Reverse_engineering
dbr
:Collaboration-oriented_architecture
dbr
:Collateral_freedom
dbr
:US_Cyber_Challenge
dbr
:ZeroFOX
dbr
:PRODIGAL_(computer_system)
dbr
:Access_control
dbr
:Commission_on_Enhancing_National_Cybersecurity
dbr
:Common_Vulnerabilities_and_Exposures
dbr
:Computer_Law_&_Security_Review
dbr
:Computer_and_network_surveillance
dbr
:Computer_emergency_response_team
dbr
:Computer_security_compromised_by_hardware_failure
dbr
:Computer_security_model
dbr
:Confused_deputy_problem
dbr
:Traffic_analysis
dbr
:HTTP_tunnel
dbr
:Threat_(computer)
dbr
:Trademark_(computer_security)
dbr
:Trusted_system
dbr
:Tunneling_protocol
dbr
:User_behavior_analytics
dbr
:YARA
dbr
:Fail-stop
dbr
:Security_breach_notification_laws
dbr
:Trustworthy_computing
dbr
:IASME
dbr
:IBM_4765
dbr
:IBM_4767
dbr
:IBM_4768
dbr
:IBM_4769
dbr
:INOC-DBA
dbr
:ITIL_security_management
dbr
:IT_baseline_protection
dbr
:IT_risk
dbr
:IT_risk_management
dbr
:MinID
dbr
:Intrusion_detection_system_evasion_techniques
dbr
:Intrusion_tolerance
dbr
:KeyRaider
dbr
:Software_Guard_Extensions
dbr
:WS-SecurityPolicy
dbr
:Open_security
dbr
:Secure_transmission
dbr
:Adversarial_machine_learning
dbr
:Common_Criteria_Evaluation_and_Validation_Scheme
dbr
:Computer_security
dbr
:Computer_security_incident_management
dbr
:Content_Threat_Removal
dbr
:Cowrie_(honeypot)
dbr
:Cyber_Threat_Intelligence_Integration_Center
dbr
:Cyber_and_Information_Domain_Service_(Germany)
dbr
:Cyber_risk_quantification
dbr
:Cyber_self-defense
dbr
:Cyber_threat_intelligence
dbr
:Dolev–Yao_model
dbr
:Domain_Based_Security
dbr
:Domain_fronting
dbr
:Length_extension_attack
dbr
:Trust_boundary
dbr
:Next-generation_firewall
dbr
:TLBleed
dbr
:Data_remanence
dbr
:Asset_Disposal_and_Information_Security_Alliance
dbr
:Camfecting
dbr
:Rublon
dbr
:Countermeasure_(computer)
dbr
:Crackme
dbr
:Wargame_(hacking)
dbr
:Shamoon
dbr
:RFPolicy
dbr
:Kill_Pill
dbr
:Fabric_of_Security
dbr
:Federal_Desktop_Core_Configuration
dbr
:Federal_Information_Security_Management_Act_of_2002
dbr
:Federal_Information_Security_Modernization_Act_of_2014
dbr
:Stuxnet
dbr
:Crypto-shredding
dbr
:Cryptographic_splitting
dbr
:Trusted_timestamping
dbr
:Evasion_(network_security)
dbr
:Fidelis_Cybersecurity
dbr
:File_integrity_monitoring
dbr
:WS-Federation
dbr
:Download_Valley
dbr
:Mayfield's_paradox
dbr
:Site_Security_Handbook
dbr
:Polyinstantiation
dbr
:Supply_chain_cyber_security
dbr
:Shadow_stack
dbr
:EnCase
dbr
:Enterprise_information_security_architecture
dbr
:Anomaly_Detection_at_Multiple_Scales
dbr
:Higgins_project
dbr
:NCP_Engineering
dbr
:Security_type_system
dbr
:McAfee_Institute
dbr
:Data-centric_security
dbr
:DataSpii
dbr
:Data_commingling
dbr
:Data_diddling
dbr
:Security_controls
dbr
:Security_hacker
dbr
:Inference_attack
dbr
:Information_Exchange_Gateway
dbr
:Information_Security_Automation_Program
dbr
:Insider_threat
dbr
:Inter-protocol_exploitation
dbr
:Open_Information_Security_Maturity_Model
dbr
:Open_Threat_Exchange
dbr
:Security_awareness
dbr
:Virus_Bulletin
dbr
:SCADA_Strangelove
dbr
:VPN_blocking
dbr
:RCCA_security
is
skos:
broader
of
dbc
:Operating_system_security
dbc
:Transport_Layer_Security
dbc
:IT_risk_management
dbc
:Information_privacy
dbc
:Access_control
dbc
:People_associated_with_computer_security
dbc
:Cryptography
dbc
:Computer_security_organizations
dbc
:Computer_security_exploits
dbc
:Cloud_infrastructure_attacks_&_failures
dbc
:Computational_trust
dbc
:Computer_access_control
dbc
:Computer_forensics
dbc
:Computer_network_security
dbc
:Computer_security_books
dbc
:Computer_security_conferences
dbc
:Computer_security_models
dbc
:Computer_security_procedures
dbc
:Computer_security_qualifications
dbc
:Computer_security_software
dbc
:Computer_security_standards
dbc
:Computer_surveillance
dbc
:Security_vulnerability_databases
dbc
:Financial_cryptography
dbc
:Data_security
dbc
:Mobile_security
dbc
:Trusted_computing
is
skos:
related
of
dbc
:Computer_security_exploits