Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
(sidebar) |
|||
| Line 1: | Line 1: | ||
| − | {{ | + | {{sidebar |
| − | | | + | |title = [[Computer security]] |
| − | | | + | |titlestyle = background:#ffc0c0 |
| − | | | + | |headingstyle = background:#ffc0c0; font-size:larger |
| − | | | + | |
| − | + | |heading1 = | |
| − | + | |content1 = {{plainlist| | |
| − | + | *[[Security-focused operating system|Secure operating systems]] | |
| − | + | *[[Security by design]] | |
| − | + | *[[Secure coding]] | |
| − | | | + | }} |
| − | | | + | |
| − | + | |heading2 = [[Computer insecurity]] | |
| − | + | |content2style = text-align:left | |
| − | + | |content2 = | |
| − | + | *[[Vulnerability (computing)|Vulnerability]] | |
| − | + | **[[Eavesdropping]] | |
| − | }}<noinclude>[[ar:قالب:أمن الحاسوب]] | + | *[[Exploit (computer security)|Exploits]] |
| + | **[[Trojan horse (computing)|Trojans]] | ||
| + | **[[Computer virus|Viruses]] and [[Computer worm|worms]] | ||
| + | **[[Denial of service]] | ||
| + | *[[Payload (computing)|Payloads]] | ||
| + | **[[Rootkit]]s | ||
| + | **[[Keylogger]]s | ||
| + | |||
| + | |name = Computer security | ||
| + | }}<noinclude>{{Documentation}} | ||
| + | [[ar:قالب:أمن الحاسوب]] | ||
| + | </noinclude> | ||
Revision as of 21:59, 9 February 2013
| Computer security |
|---|
| Computer insecurity |
| The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |