Computer Security. Compromising of Data . Computer Hackers . Computer Worms . Cyber Security . Cybersecurity . Data Encryption . Information Protection . Computer Hacker . Computer Virus . Computer Worm . Data Compromising . Data Encryptions . Encryption, Data . Encryptions, Data . Hacker, Computer . Hackers, Computer . Protection, Data . Protection, Information . Security, Computer . Security, Cyber . Security, Data . Virus, Computer . Viruses, Computer . Worm, Computer . Worms, Computer . Data Protection . Data Security . Computer Viruses . Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. . 1.00
Dataset. Data Set . Works consisting of organized collections of data, which have been stored permanently in a formalized manner suitable for communication, interpretation, or processing. . 0.46
Chronology as Topic. Dates . Chronology as Topics . Works about the temporal sequence of events. . 0.45
Database. Data Base . Database [Publication Type] . Work consisting of a structured file of information or a set of logically related data stored and retrieved using computer-based means. . 0.43