Difference between revisions of "Template:Computer science"
Jump to navigation
Jump to search
(IEEE and OSI Model are not a networking related field of CS, neither is DoD for Security) |
((rv).) |
||
| Line 52: | Line 52: | ||
|list1 = [[Computer data storage]]{{·}} [[:Category:Database theory|Database theory]]{{·}} [[Data mining]]{{·}} [[Data modeling]]{{·}} [[Geographic information system]] | |list1 = [[Computer data storage]]{{·}} [[:Category:Database theory|Database theory]]{{·}} [[Data mining]]{{·}} [[Data modeling]]{{·}} [[Geographic information system]] | ||
|group2 = [[Computer_networking|Networking]] | |group2 = [[Computer_networking|Networking]] | ||
| − | |list2 = [[Communication]]{{·}} [[Teletraffic engineering|Traffic Engineering]]{{·}} [[Broadcast network|Broadcasting]]{{·}} [[Network topology]]{{·}} [[Cryptography]]{{·}} [[World Wide Web]]{{·}} [[Semantic Web]]{{·}} [[Internetworking]]{{·}} [[Public switched telephone network|PSTN]] / [[Synchronous optical networking|SONET]]{{·}} [[IPTV]] | + | |list2 = [[Communication]]{{·}} [[Teletraffic engineering|Traffic Engineering]]{{·}} [[Broadcast network|Broadcasting]]{{·}} [[Network topology]]{{·}} [[OSI model]]{{·}} [[Cryptography]]{{·}} [[World Wide Web]]{{·}} [[Semantic Web]]{{·}} [[Internetworking]]{{·}} [[Public switched telephone network|PSTN]] / [[Synchronous optical networking|SONET]]{{·}} [[Institute of Electrical and Electronics Engineers|IEEE]]{{·}} [[IPTV]] |
|group3 = [[Computer security|Security]] | |group3 = [[Computer security|Security]] | ||
| − | |list3 = [[Intelligence]]{{·}} [[Encryption]]{{·}} [[Cryptographic protocol|Protocol]]s{{·}} [[Spam (electronic)|Spam]]{{·}} [[Online predator]]{{·}} [[Identity theft]]{{·}} [[Internet privacy]]{{·}} [[Trusted Computing]]{{·}} [[Adware|Advertising Ethics]]{{·}} [[Computer forensics]]{{·}} [[Computer surveillance]] | + | |list3 = [[Intelligence]]{{·}} [[Encryption]]{{·}} [[Cryptographic protocol|Protocol]]s{{·}} [[Spam (electronic)|Spam]]{{·}} [[Online predator]]{{·}} [[Identity theft]]{{·}} [[Internet privacy]]{{·}} [[Trusted Computing]]{{·}} [[Adware|Advertising Ethics]]{{·}} [[Computer forensics]]{{·}} [[Computer surveillance]]{{·}} [[United States Department of Defense|DoD]] |
}} | }} | ||
|below = NOTE: Computer science can also be split up into different topics or fields according to the [[ACM Computing Classification System]]. | |below = NOTE: Computer science can also be split up into different topics or fields according to the [[ACM Computing Classification System]]. | ||
}} | }} | ||