|
Computer security
|
|
|
--subdivision Computer networks--Security measures under subjects
|
|
|
Here are entered works on tracking, analyzing, and countering digital security threats. Works on the collection and processing, for subsequent intelligence purposes, of information derived primarily from electronic signals that do not contain speech or text are entered under Electronic intelligence
|
|
--subdivision Code words under topical subdivisions, e.g. Computers--Access control--Code words
|
|
|
|
Here are entered works on unauthorized changes to computer files, systems, or networks as well as to works on third-party programmatic changes to a file, network, game, or other electronic device
|
|
|
|
|
Add Marked to Bag
Add All On Page
|