Statements (148)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:film
|
gptkbp:awards |
Best Sci-Fi Film 2009
|
gptkbp:box_office |
$5,000,000
|
gptkbp:budget |
$1,000,000
|
gptkbp:character |
gptkb:Character_A
gptkb:Character_B gptkb:Character_C Character D Character E |
gptkbp:cinematography_by |
Cinematographer Y
|
gptkbp:country |
gptkb:USA
|
gptkbp:directed_by |
gptkb:John_Doe
|
gptkbp:distributor |
Distributor Q
|
gptkbp:edited_by |
Editor Z
|
gptkbp:filming_location |
Location 1
Location 2 Location 3 |
gptkbp:genre |
gptkb:science_fiction
|
https://www.w3.org/2000/01/rdf-schema#label |
Secure Computing (2008)
|
gptkbp:language |
English
|
gptkbp:music_by |
gptkb:Composer_X
|
gptkbp:plot |
A story about the implications of secure computing.
|
gptkbp:produced_by |
gptkb:Jane_Smith
|
gptkbp:rating |
PG-13
|
gptkbp:release_format |
gptkb:DVD
gptkb:Blu-ray Digital |
gptkbp:released_on |
2008-01-01
|
gptkbp:runtime |
120 minutes
|
gptkbp:screenplay_by |
gptkb:Screenwriter_W
|
gptkbp:starring |
Actor A
Actor B |
gptkbp:theme |
gptkb:crypt
gptkb:blockchain_technology gptkb:virtual_reality gptkb:Compliance_Management gptkb:Artificial_Intelligence gptkb:cloud_computing gptkb:Internet_of_Things gptkb:Cybersecurity gptkb:security_services Digital rights Disaster recovery Malware Phishing Risk management Data breaches Human-computer interaction Surveillance Business continuity Network architecture Ransomware Data security Incident response Penetration testing Security consulting Security management Vulnerability assessment Technology and society Data privacy Cloud security Network security Security best practices Security policies Privacy laws Security audits Hacking Mobile security Security monitoring Security training Threat intelligence Artificial intelligence ethics Incident management Digital forensics Digital identity Security risks Security operations Security compliance Security frameworks Security assessments Social engineering Information warfare Security tools Identity and access management Software vulnerabilities Security awareness programs Future of technology Security awareness Application security Security solutions Endpoint security Security strategy Security technologies Security certifications Cyber law Security incident response Ethical hacking Security incident management Ethics in computing Security architecture design Security policy development Security governance Security risk assessment Security incident response training Incident detection Security incident response planning Security operations center User awareness training Security program management Security incident response teams Security incident response resources Security incident response tools Security incident response exercises Security incident response procedures Io T security Security incident response collaboration Security incident response communication Security incident response coordination Security incident response documentation Security incident response funding Security incident response metrics Security incident response partnerships Security incident response planning process Security incident response reporting Security incident response simulations Security incident response team collaboration Security incident response team communication Security incident response team coordination Security incident response team evaluations Security incident response team exercises Security incident response team funding Security incident response team improvements Security incident response team partnerships Security incident response team planning process Security incident response team resources Security incident response team responsibilities Security incident response team roles Security incident response team training Security incident response team training and exercises Security incident response team collaboration and partnerships Security incident response team roles and responsibilities Security incident response team evaluations and improvements Security incident response team resources and funding Security incident response team planning and execution Security incident response team communication and coordination |
gptkbp:website |
www.securecomputingmovie.com
|
gptkbp:bfsParent |
gptkb:Mc_Afee_Associates
|
gptkbp:bfsLayer |
7
|