22:
119:
77:
53:
153:
221:
Note: this template is intended to be focused on SSL and its modern successor TLS and their variants, and in particular the strengths, weaknesses, and most notable special features, of the HTTPS/SSL/TLS/CA ecosystem that has evolved around it over time.
184:
248:
253:
225:
Although parts of it may necessarily overlap with the general cryptography template, it is not intended to compete with or be a replacement for, that template. --
93:
258:
142:
84:
58:
263:
273:
128:
63:
268:
33:
167:
193:
Create the
Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
39:
92:
on
Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
230:
162:
89:
226:
196:
Find editors who have shown interest in this subject and ask them to take a look here.
242:
118:
76:
52:
234:
152:
15:
151:
117:
88:, a collaborative effort to improve the coverage of
174:Review importance and quality of existing articles
177:Identify categories related to Computer Security
32:does not require a rating on Knowledge (XXG)'s
102:Knowledge (XXG):WikiProject Computer Security
8:
183:Identify articles for creation (see also:
137:
47:
249:Template-Class Computer Security articles
165:. Please allow some days for processing.
254:NA-importance Computer Security articles
49:
105:Template:WikiProject Computer Security
82:This template is within the scope of
21:
19:
7:
38:It is of interest to the following
14:
259:Template-Class Computing articles
190:Identify articles for improvement
264:NA-importance Computing articles
75:
51:
20:
274:All Computer Security articles
126:This template is supported by
1:
161:will be generated shortly by
143:WikiProject Computer Security
96:and see a list of open tasks.
85:WikiProject Computer Security
290:
235:00:28, 10 March 2015 (UTC)
108:Computer Security articles
136:
125:
70:
46:
269:All Computing articles
156:
122:
155:
129:WikiProject Computing
121:
180:Tag related articles
141:Things you can help
168:More information...
157:
123:
34:content assessment
214:
213:
210:
209:
206:
205:
202:
201:
99:Computer Security
90:computer security
59:Computer Security
281:
185:Article requests
170:
138:
110:
109:
106:
103:
100:
79:
72:
71:
66:
55:
48:
25:
24:
23:
16:
289:
288:
284:
283:
282:
280:
279:
278:
239:
238:
219:
171:
166:
107:
104:
101:
98:
97:
61:
12:
11:
5:
287:
285:
277:
276:
271:
266:
261:
256:
251:
241:
240:
218:
215:
212:
211:
208:
207:
204:
203:
200:
199:
198:
197:
194:
191:
188:
181:
178:
175:
159:Article alerts
150:
147:
146:
134:
133:
124:
114:
113:
111:
94:the discussion
80:
68:
67:
56:
44:
43:
37:
26:
13:
10:
9:
6:
4:
3:
2:
286:
275:
272:
270:
267:
265:
262:
260:
257:
255:
252:
250:
247:
246:
244:
237:
236:
232:
228:
223:
216:
195:
192:
189:
186:
182:
179:
176:
173:
172:
169:
164:
160:
154:
149:
148:
144:
140:
139:
135:
131:
130:
120:
116:
115:
112:
95:
91:
87:
86:
81:
78:
74:
73:
69:
65:
60:
57:
54:
50:
45:
41:
35:
31:
27:
18:
17:
224:
220:
158:
127:
83:
40:WikiProjects
29:
243:Categories
227:The Anome
163:AAlertBot
64:Computing
30:template
36:scale.
145:with:
28:This
231:talk
217:Note
245::
233:)
62::
229:(
187:)
132:.
42::
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.