{"@context":{"ns0":"https://lod.nal.usda.gov/nalt/","rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","owl":"http://www.w3.org/2002/07/owl#","ns1":"https://lod.nal.usda.gov/naltv#","skos":"http://www.w3.org/2004/02/skos/core#","dct":"http://purl.org/dc/terms/","ns2":"https://lod.nal.usda.gov/"},"@graph":[{"@id":"ns0:336259","@type":["owl:NamedIndividual","ns1:Topic","skos:Concept"],"skos:prefLabel":[{"@value":"computer security","@language":"en"},{"@value":"seguridad informática","@language":"es"}],"skos:broader":{"@id":"ns0:28418"},"skos:definition":[{"@id":"ns0:336259a-def"},{"@id":"ns0:336259b-def"}],"skos:altLabel":[{"@value":"cybersecurity","@language":"en"},{"@value":"data security (computers)","@language":"en"},{"@value":"data protection (computers)","@language":"en"}],"skos:narrower":{"@id":"ns0:336260"},"dct:created":{"@value":"2020-02-14","@type":"http://www.w3.org/2001/XMLSchema#date"},"skos:inScheme":{"@id":"ns2:nalt"},"dct:modified":{"@value":"2020-10-29","@type":"http://www.w3.org/2001/XMLSchema#date"},"skos:related":[{"@id":"ns0:254112"},{"@id":"ns0:323048"}]},{"@id":"ns0:28418","skos:narrower":{"@id":"ns0:336259"}},{"@id":"ns0:336260","skos:broader":{"@id":"ns0:336259"}},{"@id":"ns0:254112","skos:related":{"@id":"ns0:336259"}},{"@id":"ns0:323048","skos:related":{"@id":"ns0:336259"}}]}
{"@context":{"ns0":"https://lod.nal.usda.gov/nalt/","rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","owl":"http://www.w3.org/2002/07/owl#","ns1":"https://lod.nal.usda.gov/naltv#","skos":"http://www.w3.org/2004/02/skos/core#","dct":"http://purl.org/dc/terms/","ns2":"https://lod.nal.usda.gov/"},"@graph":[{"@id":"ns0:336259","@type":["owl:NamedIndividual","ns1:Topic","skos:Concept"],"skos:prefLabel":[{"@value":"computer security","@language":"en"},{"@value":"seguridad informática","@language":"es"}],"skos:broader":{"@id":"ns0:28418"},"skos:definition":[{"@id":"ns0:336259a-def"},{"@id":"ns0:336259b-def"}],"skos:altLabel":[{"@value":"cybersecurity","@language":"en"},{"@value":"data security (computers)","@language":"en"},{"@value":"data protection (computers)","@language":"en"}],"skos:narrower":{"@id":"ns0:336260"},"dct:created":{"@value":"2020-02-14","@type":"http://www.w3.org/2001/XMLSchema#date"},"skos:inScheme":{"@id":"ns2:nalt"},"dct:modified":{"@value":"2020-10-29","@type":"http://www.w3.org/2001/XMLSchema#date"},"skos:related":[{"@id":"ns0:254112"},{"@id":"ns0:323048"}]},{"@id":"ns0:28418","skos:narrower":{"@id":"ns0:336259"}},{"@id":"ns0:336260","skos:broader":{"@id":"ns0:336259"}},{"@id":"ns0:254112","skos:related":{"@id":"ns0:336259"}},{"@id":"ns0:323048","skos:related":{"@id":"ns0:336259"}}]}