![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
Research Home
Tools Art & Architecture Thesaurus Full Record Display
|
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![Art & Architecture Thesaurus Full Record Display](/research/tools/vocabularies/images/header_aat_record_display.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![Previous Page](/research/tools/vocabularies/images/previous_page.gif) |
![Help](/global/images/global_help.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
Click the icon to view the hierarchy. |
|
![](/global/images/global_hierarchy.gif) |
security software (<temporary alphabetical list: data processing equipment>, data processing equipment, ... Furnishings and Equipment (hierarchy name)) |
|
Note: Software that, on a broad level, protects computer networks, personal computers, and other devices such as smartphones, from intrusion by outsiders. Some examples of this protection might be antivirus software, firewall software, encryption software, or VPN software. |
Terms: |
|
security software (preferred,C,U,English-P,D,U,B)
|
logiciel de protection (C,U,French-P,AD,U,MSN)
|
|
Facet/Hierarchy Code: V.TH |
Hierarchical Position:
![](/global/images/ghost.gif) |
|
![Hierarchy of Objects Facet](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
Objects Facet |
|
![Hierarchy of Furnishings and Equipment (hierarchy name)](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
.... Furnishings and Equipment (hierarchy name) (G) |
|
![Hierarchy of Tools and Equipment (hierarchy name)](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
........ Tools and Equipment (hierarchy name) (G) |
|
![Hierarchy of equipment](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
............ equipment (G) |
|
![Hierarchy of <equipment by process>](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
................ <equipment by process> (G) |
|
![Hierarchy of data processing equipment](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
.................... data processing equipment (G) |
|
![Hierarchy of <temporary alphabetical list: data processing equipment>](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
........................ <temporary alphabetical list: data processing equipment> (G) |
|
![Hierarchy of security software](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
............................ security software (G,U) |
Sources and Contributors: |
|
|