-
Notifications
You must be signed in to change notification settings - Fork 0
/
Learnmore.html
84 lines (66 loc) · 3.21 KB
/
Learnmore.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<title>Computer Security</title>
<meta name="author" content="Nasreen Roomaney"/>
<style type="text/css">A:link { text-decoration: none;}A:hover { background: url(http://www.dolliehost.com/dolliecrave/graphics/linkhovers/13.gif);}</style>
<style>
body {
background: #E6E0F8;
}
p {
width: 100%;
line-height: 1.8;
text-align: justify;
color: #FA58AC;
}
h1 {
font-size: 60pt;
background-repeat: repeat-x;
background-size: 8ch 100%;
-webkit-background-clip: text;
-webkit-text-fill-color: transparent;
background-image: linear-gradient(to right, #57365a 0ch, Yellow 1ch, Indigo 1ch, Indigo 2ch, Blue 2ch, #2f732e 3ch, Orange 3ch, Orange 4ch, Violet 4ch, Violet 5ch, Green 5ch, Green 6ch, #5b2979 6ch, Red 7ch);
text-align: center;
}
h2 {
font-size: 2em;
color: #2ECCFA;
}
#site-footer {
height: 50px;
background: #084B8A;
}
#footer1{
margin-left:2%;
float:left;
}
</style>
</head>
<body>
<h1>Computer Security
<p> <img src="https://accelerator-origin.kkomando.com/wp-content/uploads/2015/03/IT-pro-testing-computer.jpg" width="970" height="546" alt="Test Security Image" align="right"</p>
</h1>
<nav>
<ul>
<p><a href="home.html" title="Home">Home</a></p>
<p><a href="learnmore.html" title="Learn More!">Learn More!</a></p>
<p><a href="recentarticles.html" title="Recent Articles">Recent Articles</a></p>
</ul>
</nav>
<h2>Learn More!</h2>
<p>
<a href="http://study.com/academy/lesson/what-is-computer-security-definition-basics.html" title="What is Computer Security?" target="_blank">What is Computer Security?</a></p>
<a href="https://its.ucsc.edu/security/training/intro.html" title="Introduction to Computer Security" target="_blank">Introduction to Computer Security</a></p>
<a href="https://www.economist.com/news/leaders/21720279-incentives-software-firms-take-security-seriously-are-too-weak-how-manage" title="How to Manage Computer Security" target="_blank">How to Manage Computer Security</a></p>
<a href="https://www.usatoday.com/story/tech/columnist/komando/2017/06/02/5-ways-test-your-computers-security/102354032" title="Watch 5 Ways to Test Your Computer's Security" target="_blank">5 Ways to Test Computer Security</a></p>
<a href="http://study.com/academy/lesson/types-of-computer-security.html" title="Watch Types of Computer Security" target="_blank">Types of Computer Security</a></p>
<a href="https://www.youtube.com/watch?v=0p3787JiFgQ" title="Watch 10 Cyber Security Facts" target="_blank">10 Cyber Security Facts</a></p>
<a href="https://www.youtube.com/watch?v=fi44mL7mcq0" title="Watch Cybersecurity: It's All About The Coders" target="_blank">Cybersecurity: It's All About The Coders</a></p>
<a href="https://www.youtube.com/watch?v=JIJslcA8Q5g" title="Watch Why Cybersecurity is Important!" target="_blank">Why Cybersecurity is Important!</a></p>
</p>
<footer id="site-footer">
<div id="footer1"><p> Web Page by: <i> Nasreen Roomaney </i> </p></div>
</footer>
</body>