This HTML5 document contains 81 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n4http://webisa.webdatacommons.org/concept/_denial_of+service+
skoshttp://www.w3.org/2004/02/skos/core#
isachttp://webisa.webdatacommons.org/concept/
n5http://webisa.webdatacommons.org/concept/_u.s.
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
xsdhhttp://www.w3.org/2001/XMLSchema#
Subject Item
isac:_password_
skos:broader
isac:_hacking_
Subject Item
isac:_oh_
skos:broader
isac:_hacking_
Subject Item
isac:_hacking_
skos:broader
isac:_hacking_
Subject Item
isac:social_engineering_
skos:broader
isac:_hacking_
Subject Item
isac:_ddo_
skos:broader
isac:_hacking_
Subject Item
isac:cross-site_scripting_
skos:broader
isac:_hacking_
Subject Item
isac:sql_injection_
skos:broader
isac:_hacking_
Subject Item
isac:_cyberattack_
skos:broader
isac:_hacking_
Subject Item
isac:_bot_
skos:broader
isac:_hacking_
Subject Item
isac:_lot_
skos:broader
isac:_hacking_
Subject Item
isac:_pc_
skos:broader
isac:_hacking_
Subject Item
isac:_programming_
skos:broader
isac:_hacking_
Subject Item
isac:_exploit_
skos:broader
isac:_hacking_
Subject Item
isac:_action_
skos:broader
isac:_hacking_
Subject Item
isac:_anyone_
skos:broader
isac:_hacking_
Subject Item
isac:_attack_
skos:broader
isac:_hacking_
Subject Item
isac:_browser_
skos:broader
isac:_hacking_
Subject Item
isac:_china_
skos:broader
isac:_hacking_
Subject Item
isac:_client_
skos:broader
isac:_hacking_
Subject Item
isac:_company_
skos:broader
isac:_hacking_
Subject Item
isac:_credit_
skos:broader
isac:_hacking_
Subject Item
isac:_crime_
skos:broader
isac:_hacking_
Subject Item
isac:_death_
skos:broader
isac:_hacking_
Subject Item
isac:_effort_
skos:broader
isac:_hacking_
Subject Item
isac:_error_
skos:broader
isac:_hacking_
Subject Item
isac:_guy_
skos:broader
isac:_hacking_
Subject Item
isac:_ip_
skos:broader
isac:_hacking_
Subject Item
isac:_iphone_
skos:broader
isac:_hacking_
Subject Item
isac:_law_
skos:broader
isac:_hacking_
Subject Item
isac:_mapping_
skos:broader
isac:_hacking_
Subject Item
isac:_network_
skos:broader
isac:_hacking_
Subject Item
isac:_night_
skos:broader
isac:_hacking_
Subject Item
isac:_nothing_
skos:broader
isac:_hacking_
Subject Item
isac:_one_
skos:broader
isac:_hacking_
Subject Item
isac:_people_
skos:broader
isac:_hacking_
Subject Item
isac:_problem_
skos:broader
isac:_hacking_
Subject Item
isac:_someone_
skos:broader
isac:_hacking_
Subject Item
isac:_something_
skos:broader
isac:_hacking_
Subject Item
isac:_string_
skos:broader
isac:_hacking_
Subject Item
isac:_system_
skos:broader
isac:_hacking_
Subject Item
isac:_threat_
skos:broader
isac:_hacking_
Subject Item
isac:_trojan_
skos:broader
isac:_hacking_
Subject Item
isac:_victim_
skos:broader
isac:_hacking_
Subject Item
isac:_video_
skos:broader
isac:_hacking_
Subject Item
isac:_behavior_
skos:broader
isac:_hacking_
Subject Item
isac:_bug_
skos:broader
isac:_hacking_
Subject Item
isac:_rom_
skos:broader
isac:_hacking_
Subject Item
isac:limited_to_
skos:broader
isac:_hacking_
Subject Item
isac:_access_
skos:broader
isac:_hacking_
Subject Item
isac:_government_
skos:broader
isac:_hacking_
Subject Item
isac:_technology_
skos:broader
isac:_hacking_
Subject Item
isac:_user_
skos:broader
isac:_hacking_
Subject Item
isac:_apple_
skos:broader
isac:_hacking_
Subject Item
isac:_book_
skos:broader
isac:_hacking_
Subject Item
isac:_case_
skos:broader
isac:_hacking_
Subject Item
isac:_computer_
skos:broader
isac:_hacking_
Subject Item
isac:_film_
skos:broader
isac:_hacking_
Subject Item
isac:_game_
skos:broader
isac:_hacking_
Subject Item
isac:_idea_
skos:broader
isac:_hacking_
Subject Item
isac:_internet_
skos:broader
isac:_hacking_
Subject Item
isac:_name_
skos:broader
isac:_hacking_
Subject Item
isac:_site_
skos:broader
isac:_hacking_
Subject Item
isac:_software_
skos:broader
isac:_hacking_
Subject Item
isac:_there_
skos:broader
isac:_hacking_
Subject Item
isac:_time_
skos:broader
isac:_hacking_
Subject Item
isac:_tool_
skos:broader
isac:_hacking_
Subject Item
isac:_well_
skos:broader
isac:_hacking_
Subject Item
isac:_knowledge_
skos:broader
isac:_hacking_
Subject Item
isac:_security_
skos:broader
isac:_hacking_
Subject Item
n4:attack
skos:broader
isac:_hacking_
Subject Item
isac:_virus_
skos:broader
isac:_hacking_
Subject Item
isac:trojan_horse_
skos:broader
isac:_hacking_
Subject Item
isac:_hacker_
skos:broader
isac:_hacking_
Subject Item
isac:_encryption_
skos:broader
isac:_hacking_
Subject Item
isac:other_side_
skos:broader
isac:_hacking_
Subject Item
isac:_malware_
skos:broader
isac:_hacking_
Subject Item
isac:industrial_espionage_
skos:broader
isac:_hacking_
Subject Item
isac:computer_fraud_
skos:broader
isac:_hacking_
Subject Item
isac:_jailbreaking_
skos:broader
isac:_hacking_
Subject Item
isac:computer_misuse_
skos:broader
isac:_hacking_
Subject Item
n5:c_1030
skos:broader
isac:_hacking_