computerweekly.com rank 88 |
Number of domains linking to computerweekly.com 17 | semantic flow 8.4 |
Number of links to computerweekly.com 153 | semantic flow 8.4 |
Number of domains linked from computerweekly.com 59 | semantic flow 11.13 |
Number of links from computerweekly.com 214 | semantic flow 11.13 |
Pages with highest topical PageRank pointing to domain.
On-topic pages from domain with highest topical PageRank.
title / url | |||||||||
---|---|---|---|---|---|---|---|---|---|
Security Think Tank: Ensure incident response in the face of inevitable messaging leaks http://www.computerweekly.com/opinion/Security-Think-Tank-Ensure-incident-response-in-the- | 0.28 | 1 | 257 | 54 | 7 | 1 | 0 | 0 | |
Trend Micro: Encryption is the foundation of cloud security http://www.computerweekly.com/news/2240169614/Trend-Micro-Encryption-is-the-foundation-of- | 0.28 | 0.79 | 254 | 35 | 6 | 1 | 1 | 1 | |
Messaging apps a growing business security risk, study shows http://www.computerweekly.com/news/450429098/Messaging-apps-a-growing-business-security-ri | 0.21 | 0.99 | 258 | 56 | 11 | 1 | 0 | 0 | |
Database security best practices: Video with David Litchfield http://www.computerweekly.com/video/Database-security-best-practices-Video-with-David-Litc | 0.21 | 0.98 | 222 | 40 | 8 | 1 | 0 | 0 |
Relevant domains with most links to selected domain.
Relevant domains with most links from selected domain.
Pages from domain with most relevant inbound links.
url | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
http://www.computerweekly.com/news/252433722/Security-spending-not-on-most-effective-contr | 2 | 0.15 | 0.95 | 0.05 | 1 | yes | 268 | 61 | 12 | 3 | 1 | 1 | |
http://www.computerweekly.com/resources/Cloud-applications | 1 | 0.15 | 0.86 | 0.05 | 0.68 | yes | 242 | 32 | 4 | 1 | 0 | 0 | |
http://www.computerweekly.com/resources/Privacy-and-data-protection | 1 | 0.15 | 0.9 | 0.04 | 0.9 | yes | 240 | 40 | 6 | 1 | 0 | 0 | |
http://www.computerweekly.com/resources/Application-security-and-coding-requirements | 1 | 0.15 | 0.86 | 0.04 | 0.98 | yes | 241 | 46 | 6 | 1 | 0 | 0 | |
http://www.computerweekly.com/resources/Mobile-hardware | 1 | 0.15 | 0.88 | 0.04 | -1 | no | -1 | -1 | -1 | -1 | 0 | 0 | |
http://www.computerweekly.com/resources/Mobile-networks | 1 | 0.15 | 0.87 | 0.04 | -1 | no | -1 | -1 | -1 | -1 | 0 | 0 | |
http://www.computerweekly.com/opinion/Zero-in-on-your-zero-day-vulnerabilities | 1 | 0.15 | 0.75 | 0.04 | -1 | - | -1 | -1 | -1 | -1 | 0 | 0 | |
http://www.computerweekly.com/resources/Content-management | 1 | 0.15 | 0.56 | 0.03 | -1 | - | -1 | -1 | -1 | -1 | 0 | 0 | |
http://www.computerweekly.com/resources/Mobile-networking | 1 | 0.15 | 0.52 | 0.02 | -1 | - | -1 | -1 | -1 | -1 | 0 | 0 | |
http://www.computerweekly.com/news | 1 | 0.15 | 0.43 | 0.02 | -1 | - | -1 | -1 | -1 | -1 | 0 | 0 |
Pages from domain with most likely on-topic outgoing links.
url | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
http://www.computerweekly.com/ | 41 | 0.15 | 0.75 | 1.57 | 0.9 | yes | 263 | 41 | 6 | 1 | 0 | 0 | |
http://www.computerweekly.com/news/252433722/Security-spending-not-on-most-effective-contr | 23 | 0.15 | 0.95 | 1.11 | 1 | yes | 268 | 61 | 12 | 3 | 1 | 1 | |
http://www.computerweekly.com/resources/Cloud-security | 9 | 0.15 | 0.86 | 0.44 | 1 | yes | 241 | 49 | 7 | 1 | 0 | 0 | |
http://www.computerweekly.com/blog/Eyes-on-APAC/Sharing-is-caring-but-is-it-safe | 9 | 0.15 | 0.79 | 0.32 | 0.85 | yes | 262 | 42 | 8 | 2 | 0 | 0 | |
http://www.computerweekly.com/resources/Application-security-and-coding-requirements | 6 | 0.15 | 0.86 | 0.31 | 0.98 | yes | 241 | 46 | 6 | 1 | 0 | 0 | |
http://www.computerweekly.com/resources/Network-securitystrategy | 6 | 0.15 | 0.89 | 0.29 | 0.98 | yes | 241 | 44 | 8 | 1 | 0 | 0 | |
http://www.computerweekly.com/resources/Privacy-and-data-protection | 3 | 0.15 | 0.9 | 0.14 | 0.9 | yes | 240 | 40 | 6 | 1 | 0 | 0 | |
http://www.computerweekly.com/resources/Cloud-applications | 3 | 0.15 | 0.86 | 0.09 | 0.68 | yes | 242 | 32 | 4 | 1 | 0 | 0 | |
http://www.computerweekly.com/resources/Mobile-hardware | 2 | 0.15 | 0.88 | 0.04 | -1 | no | -1 | -1 | -1 | -1 | 0 | 0 | |
http://www.computerweekly.com/ehandbook/Cloud-A-security-risk-and-opportunity | 1 | 0.15 | 0.83 | 0.03 | 0.99 | yes | 221 | 38 | 9 | 1 | 0 | 0 |
Similar domains to domain, based on inbound linking patterns from other relevant domains. This is also known in SEO as topical co-citation.