Computer Security. Compromising of Data . Computer Hackers . Computer Worms . Cyber Security . Cybersecurity . Data Encryption . Information Protection . Computer Hacker . Computer Virus . Computer Worm . Data Compromising . Data Encryptions . Encryption, Data . Encryptions, Data . Hacker, Computer . Hackers, Computer . Protection, Data . Protection, Information . Security, Computer . Security, Cyber . Security, Data . Virus, Computer . Viruses, Computer . Worm, Computer . Worms, Computer . Data Protection . Data Security . Computer Viruses . Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. . 1.00
Computers. Calculator, Programmable . Computer . Computer, Digital . Digital Computer . Digital Computers . Programmable Calculator . Programmable Calculators . Calculators, Programmable . Computers, Digital . Computer Hardware . Hardware, Computer . 0.69
/virology. /viruses . Used with organs, animals, and higher plants and with diseases for virologic studies. For bacteria, rickettsia, and fungi, "microbiology" is used; for parasites, "parasitology" is used. . 0.66
Viruses. Animal Virus . Virus . Virus, Animal . Viruses, Animal . Animal Viruses . Vertebrate Viruses . Zoophaginae . Minute infectious agents whose genomes are composed of DNA or RNA, but not both. They are characterized by a lack of independent metabolism and the inability to replicate outside living host cells. . 0.66