Talk:Computer security
From Wikipedia, the free encyclopedia
Skip to table of contents |
This is the talk page for discussing improvements to the Computer security article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1, 2, 3Auto-archiving period: 365 days |
More information Article milestones, Date ...
Computer security is a former featured article. Please see the links under Article milestones below for its original nomination page (for older articles, check the nomination archive) and why it was removed. | ||||||||||||||||
| ||||||||||||||||
Current status: Former featured article |
Close
More information Associated task forces:, Things you can help WikiProject Computer science with: ...
This level-4 vital article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Close
The contents of the Digital security page were merged into Computer security on 1 May 2023. For the contribution history and old versions of the redirected page, please see its history; for the discussion at that location, see its talk page. |
The contents of the Computer insecurity page were merged into Computer security on March 16, 2014. For the contribution history and old versions of the redirected page, please see its history; for the discussion at that location, see its talk page. |
On 4 July 2023, it was proposed that this article be moved to Cybersecurity. The result of the discussion was not moved. |
This page has archives. Sections older than 365 days may be automatically archived by Lowercase sigmabot III when more than 5 sections are present. |