Category:Security Subgroup
Jump to navigation
Jump to search
| ||||||||
Main article | Home | Talk | All articles (125) | Citable (2) | Members (2) | Recent changes | ||
Affiliation: Computers (Recent changes)| Military (Recent changes)| Engineering (Recent changes)| [ e ] |
This is a listing of articles under the purview of the Computers, Military and Engineering Workgroups that have been designated as particularly relevant to the Security Subgroup.
To designate an article for inclusion in this subgroup, go to the article's Metadata page and :
- List Security as one of the subgroup categories (i.e., sub1, sub2 or sub3) as indicated by the B in the adjacent image.
- Update or add appropriate workgroup categories (i.e., cat1, cat2 or cat3) as indicated by the A in the adjacent image.
- Update the appropriate entries for cat_check, status, underlinked and cleanup; see here for a full explanation of these fields.
- It is often necessary to "jog" articles to make them display in workgroups and subgroups. "Jogging" is done by editing an article's main page and adding a blank space at the end of any paragraph.
- The Metadata page may list the article for inclusion in as many as 3 main workgroup categories plus as many as 3 subgroup categories.
Pages in category "Security Subgroup"
The following 125 pages are in this category, out of 125 total.
A
B
C
- Caesar cipher
- Camellia (cipher)
- Canary value
- CAST (cipher)
- Certificate revocation list
- Certification authority
- Challenge-response protocol
- Cipher
- Classified information
- Clipper chip
- Communications Security Establishment
- Computer security
- Cross site scripting
- Cryptanalysis
- Cryptographic key
- Cryptography
- Politics of cryptography
- Cryptology
- History of cryptology
D
H
I
M
P
S
- SAFER (cipher)
- Script kiddie
- Secure Sockets Layer
- Security
- SEED (cipher)
- Serpent (cipher)
- Session border controller
- Sinkhole (Computer network)
- Sinkhole (computers)
- Skipjack (cipher)
- Social engineering
- Spyware
- Square (cipher)
- Stream cipher
- Symmetric key cryptography
- System Control And Data Acquisition