Display title | Vulnerability assessment (computing) |
Default sort key | Vulnerability assessment (computing) |
Page length (in bytes) | 5,280 |
Namespace ID | 0 |
Page ID | 52505053 |
Page content language | en - English |
Page content model | wikitext |
Indexing by robots | Allowed |
Number of page watchers | Fewer than 30 watchers |
Number of redirects to this page | 0 |
Counted as a content page | Yes |
Wikidata item ID | Q30689485 |
Central description | process of defining, identifying and classifying the security holes in information technology systems |
Page views in the past 30 days | |
Edit | Allow all users (no expiry set) |
Move | Allow all users (no expiry set) |
Page creator | Azam.ikram (talk | contribs) |
Date of page creation | 13:43, 7 December 2016 |
Latest editor | Tule-hog (talk | contribs) |
Date of latest edit | 22:36, 18 July 2024 |
Total number of edits | 19 |
Recent number of edits (within past 30 days) | 0 |
Recent number of distinct authors | 0 |
Transcluded templates (18) | Pages transcluded onto the current version of this page (help):
|
Wikidata entities used in this page | |