Other terms
Security, Computer,Computer Hackers,Computer Hacker,Hacker, Computer,Hackers, Computer,Information Protection,Protection, Information,Computer Worms,Computer Worm,Worm, Computer,Worms, Computer,Data Protection,Protection, Data,Data Security,Security, Data,Compromising of Data,Data Compromising,Computer Viruses,Computer Virus,Virus, Computer,Viruses, Computer
Description
Computer Security: Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or data structures, especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or so-called computer hackers aiming to compromise stored data.
Pervious tree
Next tree
Other locations in tree
Legal notice
The U.S. National Library of Medicine is the creator, maintainer, and provider of the data above.
The version of the data is 2010 MeSH. Last reviewed April 26, 2010. No modification has been made in the content of the file.
Neither the United States Government, nor any of its agencies, contractors, subcontractors or employees makes any warranties, expressed or implied, with respect to data contained in the database, and, furthermore, assumes no legal liability for any party's use, or the results of such use, of any part of the database.
You will not assert any proprietary rights to any portion of the database, or represent the database or any part thereof to anyone as other than a United States Government database.
The MeSH data carry an international copyright outside the United States, its Territories or Possessions. These terms and conditions are in effect as long as the user retains any of the MeSH data obtained from this site.