<Ul> <Li> Computer access control </Li> <Li> Application security <Ul> <Li> Antivirus software </Li> <Li> Secure coding </Li> <Li> Security by design </Li> <Li> Secure operating systems </Li> </Ul> </Li> <Li> Authentication <Ul> <Li> Multi-factor authentication </Li> </Ul> </Li> <Li> Authorization </Li> <Li> Data - centric security </Li> <Li> Firewall (computing) </Li> <Li> Intrusion detection system </Li> <Li> Intrusion prevention system </Li> <Li> Mobile secure gateway </Li> </Ul> <Li> Computer access control </Li> <Li> Application security <Ul> <Li> Antivirus software </Li> <Li> Secure coding </Li> <Li> Security by design </Li> <Li> Secure operating systems </Li> </Ul> </Li> <Ul> <Li> Antivirus software </Li> <Li> Secure coding </Li> <Li> Security by design </Li> <Li> Secure operating systems </Li> </Ul>

Who invented the first anti-virus software and when was it written