http://dbpedia.org/resource/Cyber_Intelligence_Sharing_and_Protection_Act +
, http://dbpedia.org/resource/Cybersecurity_Information_Sharing_Act +
, http://dbpedia.org/resource/Macro_and_security +
, http://dbpedia.org/resource/Access_level +
, http://dbpedia.org/resource/Security_type_system +
, http://dbpedia.org/resource/Cybersex_trafficking +
, http://dbpedia.org/resource/Camfecting +
, http://dbpedia.org/resource/Vulnerabilities_Equities_Process +
, http://dbpedia.org/resource/Outline_of_computer_security +
, http://dbpedia.org/resource/SMBGhost +
, http://dbpedia.org/resource/STRIDE_%28security%29 +
, http://dbpedia.org/resource/Adrozek +
, http://dbpedia.org/resource/Federal_Desktop_Core_Configuration +
, http://dbpedia.org/resource/Principal_%28computer_security%29 +
, http://dbpedia.org/resource/BlueHat +
, http://dbpedia.org/resource/Cyber_Threat_Intelligence_Integration_Center +
, http://dbpedia.org/resource/Fail-stop +
, http://dbpedia.org/resource/Confused_deputy_problem +
, http://dbpedia.org/resource/Security_hacker +
, http://dbpedia.org/resource/Pwnie_Awards +
, http://dbpedia.org/resource/Anomaly_Detection_at_Multiple_Scales +
, http://dbpedia.org/resource/PRODIGAL_%28computer_system%29 +
, http://dbpedia.org/resource/Open_security +
, http://dbpedia.org/resource/RFPolicy +
, http://dbpedia.org/resource/Computer_security_incident_management +
, http://dbpedia.org/resource/Co-managed_Security +
, http://dbpedia.org/resource/Cyber_risk_quantification +
, http://dbpedia.org/resource/Zardoz_%28computer_security%29 +
, http://dbpedia.org/resource/Wargame_%28hacking%29 +
, http://dbpedia.org/resource/Security_Vision +
, http://dbpedia.org/resource/Application_portfolio_attack_surface +
, http://dbpedia.org/resource/System_integrity +
, http://dbpedia.org/resource/Digital_supply_chain_security +
, http://dbpedia.org/resource/HEAT_LANrev +
, http://dbpedia.org/resource/Shadow_stack +
, http://dbpedia.org/resource/Democratic_Congressional_Campaign_Committee_cyber_attacks +
, http://dbpedia.org/resource/Stegomalware +
, http://dbpedia.org/resource/Biometric_device +
, http://dbpedia.org/resource/Principle_of_least_privilege +
, http://dbpedia.org/resource/Control-flow_integrity +
, http://dbpedia.org/resource/Trust_on_first_use +
, http://dbpedia.org/resource/Network_eavesdropping +
, http://dbpedia.org/resource/Data-centric_security +
, http://dbpedia.org/resource/Sherwood_Applied_Business_Security_Architecture +
, http://dbpedia.org/resource/Cyber_Discovery +
, http://dbpedia.org/resource/Dolev%E2%80%93Yao_model +
, http://dbpedia.org/resource/Seccomp +
, http://dbpedia.org/resource/Data_commingling +
, http://dbpedia.org/resource/Zero-knowledge_service +
, http://dbpedia.org/resource/Shell_Control_Box +
, http://dbpedia.org/resource/Nobody_%28username%29 +
, http://dbpedia.org/resource/Intrusion_tolerance +
, http://dbpedia.org/resource/Content_Threat_Removal +
, http://dbpedia.org/resource/Anderson%27s_rule_%28computer_science%29 +
, http://dbpedia.org/resource/Secure_state +
, http://dbpedia.org/resource/Thermal_attack +
, http://dbpedia.org/resource/Secure_coding +
, http://dbpedia.org/resource/Security_bug +
, http://dbpedia.org/resource/HTTP_tunnel +
, http://dbpedia.org/resource/Resilient_control_systems +
, http://dbpedia.org/resource/Open-source_software_security +
, http://dbpedia.org/resource/Cyber_Ireland +
, http://dbpedia.org/resource/Opal_Storage_Specification +
, http://dbpedia.org/resource/Secure_element +
, http://dbpedia.org/resource/Internet_Security_Awareness_Training +
, http://dbpedia.org/resource/Information_Security_Forum +
, http://dbpedia.org/resource/EasyJet_data_breach +
, http://dbpedia.org/resource/British_Airways_data_breach +
, http://dbpedia.org/resource/Aurora_Generator_Test +
, http://dbpedia.org/resource/ITIL_security_management +
, http://dbpedia.org/resource/Security_testing +
, http://dbpedia.org/resource/Security.txt +
, http://dbpedia.org/resource/Ciscogate +
, http://dbpedia.org/resource/National_Cyber_Security_Policy_2013 +
, http://dbpedia.org/resource/CPU_modes +
, http://dbpedia.org/resource/Cure53 +
, http://dbpedia.org/resource/WS-SecurityPolicy +
, http://dbpedia.org/resource/Follina_%28security_vulnerability%29 +
, http://dbpedia.org/resource/Krebs_on_Security +
, http://dbpedia.org/resource/Client_honeypot +
, http://dbpedia.org/resource/Closed-loop_authentication +
, http://dbpedia.org/resource/Security_breach_notification_laws +
, http://dbpedia.org/resource/Model-driven_security +
, http://dbpedia.org/resource/Ware_report +
, http://dbpedia.org/resource/Cyber_range +
, http://dbpedia.org/resource/Runtime_application_self-protection +
, http://dbpedia.org/resource/Relying_party +
, http://dbpedia.org/resource/Information_security_operations_center +
, http://dbpedia.org/resource/SCADA_Strangelove +
, http://dbpedia.org/resource/Proof-carrying_code +
, http://dbpedia.org/resource/Four_Horsemen_of_the_Infocalypse +
, http://dbpedia.org/resource/Grayshift +
, http://dbpedia.org/resource/Air_India_data_breach +
, http://dbpedia.org/resource/Cyberbiosecurity +
, http://dbpedia.org/resource/Public_computer +
, http://dbpedia.org/resource/Intel_Management_Engine +
, http://dbpedia.org/resource/Centurion_guard +
, http://dbpedia.org/resource/Deception_technology +
, http://dbpedia.org/resource/Fabric_of_Security +
, http://dbpedia.org/resource/Domain_fronting +
, http://dbpedia.org/resource/Software_Guard_Extensions +
, http://dbpedia.org/resource/Language-based_security +
, http://dbpedia.org/resource/Parkerian_Hexad +
, http://dbpedia.org/resource/Usage_of_job_applications_by_hackers +
, http://dbpedia.org/resource/SafetyNet_API +
, http://dbpedia.org/resource/Secure_environment +
, http://dbpedia.org/resource/Software-defined_perimeter +
, http://dbpedia.org/resource/Computer_security_compromised_by_hardware_failure +
, http://dbpedia.org/resource/Physical_information_security +
, http://dbpedia.org/resource/Security_and_Privacy_in_Computer_Systems +
, http://dbpedia.org/resource/Dancing_pigs +
, http://dbpedia.org/resource/Separation_of_protection_and_security +
, http://dbpedia.org/resource/Content_Disarm_&_Reconstruction +
, http://dbpedia.org/resource/Linked_timestamping +
, http://dbpedia.org/resource/Enrollment_over_Secure_Transport +
, http://dbpedia.org/resource/Trust_boundary +
, http://dbpedia.org/resource/CloudPassage +
, http://dbpedia.org/resource/Kill_Pill +
, http://dbpedia.org/resource/Blue_team_%28computer_security%29 +
, http://dbpedia.org/resource/Physical_access +
, http://dbpedia.org/resource/Security_of_smart_meters +
, http://dbpedia.org/resource/Reverse_engineering +
, http://dbpedia.org/resource/Cybercrime +
, http://dbpedia.org/resource/Information_Exchange_Gateway +
, http://dbpedia.org/resource/Operations_security +
, http://dbpedia.org/resource/Typed_assembly_language +
, http://dbpedia.org/resource/Data_remanence +
, http://dbpedia.org/resource/Automotive_security +
, http://dbpedia.org/resource/Defense_strategy_%28computing%29 +
, http://dbpedia.org/resource/Security_awareness +
, http://dbpedia.org/resource/Cyber_Storm_Exercise +
, http://dbpedia.org/resource/Aptum_Technologies +
, http://dbpedia.org/resource/BeyondCorp +
, http://dbpedia.org/resource/Refraction_networking +
, http://dbpedia.org/resource/High_Assurance_Guard +
, http://dbpedia.org/resource/Computer_security +
, http://dbpedia.org/resource/Howard_Schmidt +
, http://dbpedia.org/resource/Adversarial_machine_learning +
, http://dbpedia.org/resource/Insider_threat +
, http://dbpedia.org/resource/DREAD_%28risk_assessment_model%29 +
, http://dbpedia.org/resource/US_Cyber_Challenge +
, http://dbpedia.org/resource/Commission_on_Enhancing_National_Cybersecurity +
, http://dbpedia.org/resource/Tunneling_protocol +
, http://dbpedia.org/resource/Host_Based_Security_System +
, http://dbpedia.org/resource/CyberPatriot +
, http://dbpedia.org/resource/Trusted_client +
, http://dbpedia.org/resource/Footprinting +
, http://dbpedia.org/resource/Cowrie_%28honeypot%29 +
, http://dbpedia.org/resource/Gifar +
, http://dbpedia.org/resource/Cloud_computing_security +
, http://dbpedia.org/resource/Spanish_Network_of_Excellence_on_Cybersecurity_Research +
, http://dbpedia.org/resource/Enterprise_information_security_architecture +
, http://dbpedia.org/resource/Standard_of_Good_Practice_for_Information_Security +
, http://dbpedia.org/resource/Thunderspy +
, http://dbpedia.org/resource/Cyber_self-defense +
, http://dbpedia.org/resource/Economics_of_security +
, http://dbpedia.org/resource/Secure_transmission +
, http://dbpedia.org/resource/Security_information_management +
, http://dbpedia.org/resource/Network_behavior_anomaly_detection +
, http://dbpedia.org/resource/IT_baseline_protection +
, http://dbpedia.org/resource/Electric_grid_security +
, http://dbpedia.org/resource/Open_Threat_Exchange +
, http://dbpedia.org/resource/System_Service_Descriptor_Table +
, http://dbpedia.org/resource/Democratic_National_Committee_cyber_attacks +
, http://dbpedia.org/resource/Digital_self-defense +
, http://dbpedia.org/resource/Zero-day_%28computing%29 +
, http://dbpedia.org/resource/List_of_security_hacking_incidents +
, http://dbpedia.org/resource/Michigan_Cyber_Range +
, http://dbpedia.org/resource/American_Innovation_and_Competitiveness_Act +
, http://dbpedia.org/resource/National_Collegiate_Cyber_Defense_Competition +
, http://dbpedia.org/resource/Hacker_Bible +
, http://dbpedia.org/resource/Cyber_and_Information_Domain_Service +
, http://dbpedia.org/resource/Risk_factor_%28computing%29 +
, http://dbpedia.org/resource/Hardware_security +
, http://dbpedia.org/resource/Capture_the_flag_%28cybersecurity%29 +
, http://dbpedia.org/resource/BlueBorne_%28security_vulnerability%29 +
, http://dbpedia.org/resource/Vulnerability_Discovery_Model +
, http://dbpedia.org/resource/Vulnerability_assessment_%28computing%29 +
, http://dbpedia.org/resource/Collateral_freedom +
, http://dbpedia.org/resource/Information_Security_Automation_Program +
, http://dbpedia.org/resource/Trademark_%28computer_security%29 +
, http://dbpedia.org/resource/Crackme +
, http://dbpedia.org/resource/Spanish_Cybersecurity_Research_Conference +
, http://dbpedia.org/resource/Defensive_computing +
, http://dbpedia.org/resource/Collaboration-oriented_architecture +
, http://dbpedia.org/resource/MinID +
, http://dbpedia.org/resource/Vanish_%28computer_science%29 +
, http://dbpedia.org/resource/Site_Security_Handbook +
, http://dbpedia.org/resource/Trustworthy_computing +
, http://dbpedia.org/resource/Parasitic_computing +
, http://dbpedia.org/resource/Vastaamo_data_breach +
, http://dbpedia.org/resource/Homeland_Open_Security_Technology +
, http://dbpedia.org/resource/Computer_Law_&_Security_Review +
, http://dbpedia.org/resource/Supervisor_Mode_Access_Prevention +
, http://dbpedia.org/resource/Security_log +
, http://dbpedia.org/resource/List_of_security_assessment_tools +
, http://dbpedia.org/resource/National_Cyber_Security_Awareness_Month +
, http://dbpedia.org/resource/ERP_security +
|
http://dbpedia.org/ontology/wikiPageWikiLink
|
http://dbpedia.org/resource/Cyber_Intelligence_Sharing_and_Protection_Act +
, http://dbpedia.org/resource/Cybersecurity_Information_Sharing_Act +
, http://dbpedia.org/resource/Macro_and_security +
, http://dbpedia.org/resource/Access_level +
, http://dbpedia.org/resource/Security_type_system +
, http://dbpedia.org/resource/Cybersex_trafficking +
, http://dbpedia.org/resource/Camfecting +
, http://dbpedia.org/resource/Vulnerabilities_Equities_Process +
, http://dbpedia.org/resource/Outline_of_computer_security +
, http://dbpedia.org/resource/SMBGhost +
, http://dbpedia.org/resource/STRIDE_%28security%29 +
, http://dbpedia.org/resource/Adrozek +
, http://dbpedia.org/resource/Federal_Desktop_Core_Configuration +
, http://dbpedia.org/resource/Principal_%28computer_security%29 +
, http://dbpedia.org/resource/BlueHat +
, http://dbpedia.org/resource/Cyber_Threat_Intelligence_Integration_Center +
, http://dbpedia.org/resource/Fail-stop +
, http://dbpedia.org/resource/Confused_deputy_problem +
, http://dbpedia.org/resource/Security_hacker +
, http://dbpedia.org/resource/Pwnie_Awards +
, http://dbpedia.org/resource/Anomaly_Detection_at_Multiple_Scales +
, http://dbpedia.org/resource/PRODIGAL_%28computer_system%29 +
, http://dbpedia.org/resource/Open_security +
, http://dbpedia.org/resource/RFPolicy +
, http://dbpedia.org/resource/Computer_security_incident_management +
, http://dbpedia.org/resource/Co-managed_Security +
, http://dbpedia.org/resource/Cyber_risk_quantification +
, http://dbpedia.org/resource/Zardoz_%28computer_security%29 +
, http://dbpedia.org/resource/Wargame_%28hacking%29 +
, http://dbpedia.org/resource/Security_Vision +
, http://dbpedia.org/resource/Application_portfolio_attack_surface +
, http://dbpedia.org/resource/System_integrity +
, http://dbpedia.org/resource/Digital_supply_chain_security +
, http://dbpedia.org/resource/HEAT_LANrev +
, http://dbpedia.org/resource/Shadow_stack +
, http://dbpedia.org/resource/Democratic_Congressional_Campaign_Committee_cyber_attacks +
, http://dbpedia.org/resource/Stegomalware +
, http://dbpedia.org/resource/Biometric_device +
, http://dbpedia.org/resource/Principle_of_least_privilege +
, http://dbpedia.org/resource/Control-flow_integrity +
, http://dbpedia.org/resource/Trust_on_first_use +
, http://dbpedia.org/resource/Network_eavesdropping +
, http://dbpedia.org/resource/Data-centric_security +
, http://dbpedia.org/resource/Sherwood_Applied_Business_Security_Architecture +
, http://dbpedia.org/resource/Cyber_Discovery +
, http://dbpedia.org/resource/Dolev%E2%80%93Yao_model +
, http://dbpedia.org/resource/Seccomp +
, http://dbpedia.org/resource/Data_commingling +
, http://dbpedia.org/resource/Zero-knowledge_service +
, http://dbpedia.org/resource/Shell_Control_Box +
, http://dbpedia.org/resource/Nobody_%28username%29 +
, http://dbpedia.org/resource/Intrusion_tolerance +
, http://dbpedia.org/resource/Content_Threat_Removal +
, http://dbpedia.org/resource/Anderson%27s_rule_%28computer_science%29 +
, http://dbpedia.org/resource/Secure_state +
, http://dbpedia.org/resource/Thermal_attack +
, http://dbpedia.org/resource/Secure_coding +
, http://dbpedia.org/resource/Security_bug +
, http://dbpedia.org/resource/HTTP_tunnel +
, http://dbpedia.org/resource/Resilient_control_systems +
, http://dbpedia.org/resource/Open-source_software_security +
, http://dbpedia.org/resource/Cyber_Ireland +
, http://dbpedia.org/resource/Opal_Storage_Specification +
, http://dbpedia.org/resource/Secure_element +
, http://dbpedia.org/resource/Internet_Security_Awareness_Training +
, http://dbpedia.org/resource/EasyJet_data_breach +
, http://dbpedia.org/resource/British_Airways_data_breach +
, http://dbpedia.org/resource/Aurora_Generator_Test +
, http://dbpedia.org/resource/ITIL_security_management +
, http://dbpedia.org/resource/Security_testing +
, http://dbpedia.org/resource/Security.txt +
, http://dbpedia.org/resource/Ciscogate +
, http://dbpedia.org/resource/National_Cyber_Security_Policy_2013 +
, http://dbpedia.org/resource/CPU_modes +
, http://dbpedia.org/resource/Cure53 +
, http://dbpedia.org/resource/WS-SecurityPolicy +
, http://dbpedia.org/resource/Follina_%28security_vulnerability%29 +
, http://dbpedia.org/resource/Krebs_on_Security +
, http://dbpedia.org/resource/Client_honeypot +
, http://dbpedia.org/resource/Security_breach_notification_laws +
, http://dbpedia.org/resource/Model-driven_security +
, http://dbpedia.org/resource/Ware_report +
, http://dbpedia.org/resource/Cyber_range +
, http://dbpedia.org/resource/Runtime_application_self-protection +
, http://dbpedia.org/resource/Relying_party +
, http://dbpedia.org/resource/Information_security_operations_center +
, http://dbpedia.org/resource/SCADA_Strangelove +
, http://dbpedia.org/resource/Proof-carrying_code +
, http://dbpedia.org/resource/Four_Horsemen_of_the_Infocalypse +
, http://dbpedia.org/resource/Grayshift +
, http://dbpedia.org/resource/Air_India_data_breach +
, http://dbpedia.org/resource/Cyberbiosecurity +
, http://dbpedia.org/resource/Public_computer +
, http://dbpedia.org/resource/Intel_Management_Engine +
, http://dbpedia.org/resource/Centurion_guard +
, http://dbpedia.org/resource/Deception_technology +
, http://dbpedia.org/resource/Fabric_of_Security +
, http://dbpedia.org/resource/Domain_fronting +
, http://dbpedia.org/resource/Software_Guard_Extensions +
, http://dbpedia.org/resource/Language-based_security +
, http://dbpedia.org/resource/Parkerian_Hexad +
, http://dbpedia.org/resource/Usage_of_job_applications_by_hackers +
, http://dbpedia.org/resource/SafetyNet_API +
, http://dbpedia.org/resource/Secure_environment +
, http://dbpedia.org/resource/Software-defined_perimeter +
, http://dbpedia.org/resource/Computer_security_compromised_by_hardware_failure +
, http://dbpedia.org/resource/Physical_information_security +
, http://dbpedia.org/resource/Security_and_Privacy_in_Computer_Systems +
, http://dbpedia.org/resource/Dancing_pigs +
, http://dbpedia.org/resource/Separation_of_protection_and_security +
, http://dbpedia.org/resource/Content_Disarm_&_Reconstruction +
, http://dbpedia.org/resource/Linked_timestamping +
, http://dbpedia.org/resource/Enrollment_over_Secure_Transport +
, http://dbpedia.org/resource/Trust_boundary +
, http://dbpedia.org/resource/CloudPassage +
, http://dbpedia.org/resource/Kill_Pill +
, http://dbpedia.org/resource/Blue_team_%28computer_security%29 +
, http://dbpedia.org/resource/Physical_access +
, http://dbpedia.org/resource/Security_of_smart_meters +
, http://dbpedia.org/resource/Reverse_engineering +
, http://dbpedia.org/resource/Cybercrime +
, http://dbpedia.org/resource/Information_Exchange_Gateway +
, http://dbpedia.org/resource/Operations_security +
, http://dbpedia.org/resource/Typed_assembly_language +
, http://dbpedia.org/resource/Data_remanence +
, http://dbpedia.org/resource/Automotive_security +
, http://dbpedia.org/resource/Defense_strategy_%28computing%29 +
, http://dbpedia.org/resource/Security_awareness +
, http://dbpedia.org/resource/Cyber_Storm_Exercise +
, http://dbpedia.org/resource/Aptum_Technologies +
, http://dbpedia.org/resource/BeyondCorp +
, http://dbpedia.org/resource/Refraction_networking +
, http://dbpedia.org/resource/High_Assurance_Guard +
, http://dbpedia.org/resource/Computer_security +
, http://dbpedia.org/resource/Adversarial_machine_learning +
, http://dbpedia.org/resource/Insider_threat +
, http://dbpedia.org/resource/DREAD_%28risk_assessment_model%29 +
, http://dbpedia.org/resource/US_Cyber_Challenge +
, http://dbpedia.org/resource/Commission_on_Enhancing_National_Cybersecurity +
, http://dbpedia.org/resource/Tunneling_protocol +
, http://dbpedia.org/resource/Host_Based_Security_System +
, http://dbpedia.org/resource/CyberPatriot +
, http://dbpedia.org/resource/Trusted_client +
, http://dbpedia.org/resource/Footprinting +
, http://dbpedia.org/resource/Cowrie_%28honeypot%29 +
, http://dbpedia.org/resource/Gifar +
, http://dbpedia.org/resource/Cloud_computing_security +
, http://dbpedia.org/resource/Spanish_Network_of_Excellence_on_Cybersecurity_Research +
, http://dbpedia.org/resource/Enterprise_information_security_architecture +
, http://dbpedia.org/resource/Thunderspy +
, http://dbpedia.org/resource/Cyber_self-defense +
, http://dbpedia.org/resource/Economics_of_security +
, http://dbpedia.org/resource/Secure_transmission +
, http://dbpedia.org/resource/Security_information_management +
, http://dbpedia.org/resource/Network_behavior_anomaly_detection +
, http://dbpedia.org/resource/IT_baseline_protection +
, http://dbpedia.org/resource/Electric_grid_security +
, http://dbpedia.org/resource/Open_Threat_Exchange +
, http://dbpedia.org/resource/System_Service_Descriptor_Table +
, http://dbpedia.org/resource/Democratic_National_Committee_cyber_attacks +
, http://dbpedia.org/resource/Digital_self-defense +
, http://dbpedia.org/resource/Zero-day_%28computing%29 +
, http://dbpedia.org/resource/List_of_security_hacking_incidents +
, http://dbpedia.org/resource/Michigan_Cyber_Range +
, http://dbpedia.org/resource/American_Innovation_and_Competitiveness_Act +
, http://dbpedia.org/resource/National_Collegiate_Cyber_Defense_Competition +
, http://dbpedia.org/resource/Hacker_Bible +
, http://dbpedia.org/resource/Cyber_and_Information_Domain_Service +
, http://dbpedia.org/resource/Risk_factor_%28computing%29 +
, http://dbpedia.org/resource/Hardware_security +
, http://dbpedia.org/resource/Capture_the_flag_%28cybersecurity%29 +
, http://dbpedia.org/resource/BlueBorne_%28security_vulnerability%29 +
, http://dbpedia.org/resource/Vulnerability_Discovery_Model +
, http://dbpedia.org/resource/Vulnerability_assessment_%28computing%29 +
, http://dbpedia.org/resource/Collateral_freedom +
, http://dbpedia.org/resource/Information_Security_Automation_Program +
, http://dbpedia.org/resource/Trademark_%28computer_security%29 +
, http://dbpedia.org/resource/Crackme +
, http://dbpedia.org/resource/Spanish_Cybersecurity_Research_Conference +
, http://dbpedia.org/resource/Defensive_computing +
, http://dbpedia.org/resource/Collaboration-oriented_architecture +
, http://dbpedia.org/resource/MinID +
, http://dbpedia.org/resource/Vanish_%28computer_science%29 +
, http://dbpedia.org/resource/Site_Security_Handbook +
, http://dbpedia.org/resource/Trustworthy_computing +
, http://dbpedia.org/resource/Parasitic_computing +
, http://dbpedia.org/resource/Vastaamo_data_breach +
, http://dbpedia.org/resource/Homeland_Open_Security_Technology +
, http://dbpedia.org/resource/Computer_Law_&_Security_Review +
, http://dbpedia.org/resource/Supervisor_Mode_Access_Prevention +
, http://dbpedia.org/resource/Security_log +
, http://dbpedia.org/resource/List_of_security_assessment_tools +
, http://dbpedia.org/resource/National_Cyber_Security_Awareness_Month +
, http://dbpedia.org/resource/ERP_security +
|
http://purl.org/dc/terms/subject
|
http://dbpedia.org/resource/Category:Computer_security_exploits +
, http://dbpedia.org/resource/Category:Data_security +
, http://dbpedia.org/resource/Category:Computer_network_security +
, http://dbpedia.org/resource/Category:Computational_trust +
, http://dbpedia.org/resource/Category:Computer_access_control +
, http://dbpedia.org/resource/Category:Computer_security_standards +
, http://dbpedia.org/resource/Category:Computer_security_organizations +
, http://dbpedia.org/resource/Category:Computer_security_books +
, http://dbpedia.org/resource/Category:People_associated_with_computer_security +
, http://dbpedia.org/resource/Category:Cryptography +
, http://dbpedia.org/resource/Category:Computer_security_procedures +
, http://dbpedia.org/resource/Category:Computer_security_conferences +
, http://dbpedia.org/resource/Category:Internet_leaks +
, http://dbpedia.org/resource/Category:Computer_security_models +
, http://dbpedia.org/resource/Category:Mobile_security +
, http://dbpedia.org/resource/Category:Computer_security_software +
, http://dbpedia.org/resource/Category:Security_vulnerability_databases +
, http://dbpedia.org/resource/Category:InfoSec_Twitter +
, http://dbpedia.org/resource/Category:Information_privacy +
, http://dbpedia.org/resource/Category:Computer_surveillance +
, http://dbpedia.org/resource/Category:Computer_forensics +
, http://dbpedia.org/resource/Category:Financial_cryptography +
, http://dbpedia.org/resource/Category:Trusted_computing +
, http://dbpedia.org/resource/Category:Software_obfuscation +
, http://dbpedia.org/resource/Category:Computer_security_qualifications +
, http://dbpedia.org/resource/Category:IT_risk_management +
|
http://www.w3.org/2004/02/skos/core#broader
|
http://dbpedia.org/resource/Category:Computer_security_exploits +
|
http://www.w3.org/2004/02/skos/core#related
|
http://dbpedia.org/resource/Category:Computer_security +
|
owl:sameAs |