Display title | Defense in depth (computing) |
Default sort key | Defense in depth (computing) |
Page length (in bytes) | 5,119 |
Namespace ID | 0 |
Page ID | 7991195 |
Page content language | en - English |
Page content model | wikitext |
Indexing by robots | Allowed |
Number of page watchers | 80 |
Number of page watchers who visited in the last 30 days | 2 |
Number of redirects to this page | 3 |
Counted as a content page | Yes |
Wikidata item ID | Q11430672 |
Local description | Concept in information security |
Central description | in information security, the placing of multiple layers of security controls throughout an IT system to provide redundancy in the event a security control fails |
Page views in the past 30 days | |
Edit | Allow all users (no expiry set) |
Move | Allow all users (no expiry set) |
Page creator | AlephGamma (talk | contribs) |
Date of page creation | 22:27, 17 November 2006 |
Latest editor | PhotographyEdits (talk | contribs) |
Date of latest edit | 14:24, 25 May 2025 |
Total number of edits | 199 |
Recent number of edits (within past 30 days) | 1 |
Recent number of distinct authors | 1 |
Hidden categories (2) | This page is a member of 2 hidden categories (help):
|
Transcluded templates (31) | Pages transcluded onto the current version of this page (help):
|
Wikidata entities used in this page | |