dc:subject
|
D.0 General, D.2.4.d Formal methods, D.4.6.a Access controls, D.4.6.b Authentication, K.4.4.f Security, K.4.4.g Internet security policies, K.6.5.a Authentication, K.6.5.c Invasive software (viruses, worms, Trojan horses), K.6.5.e Unauthorized access (hacking, phreaking), K.6.m.b Security, C.4.f Reliability, availability, and serviceability, D.2.9.m Risk management, D.4.5.e High availability, D.4.6.d Information flow controls, Intrusion Tolerance, Data exfiltration,
(xsd:string)
|