Computer data logging

Results: 86



#Item
61Software / Mouse / Button / North American Industry Classification System / Wage / SQL / Computing / Human–computer interaction / GUI widget

Microsoft Word - _04 Logging Wage Data Series for FRCS.doc

Add to Reading List

Source URL: www.fs.fed.us

Language: English - Date: 2013-03-28 13:50:55
62Public safety / Crime prevention / National security / Information systems / Information security / Chief information officer / Security awareness / Security guard / Security controls / Computer security / Security / Data security

Policy Summary No. 11 Monitoring and Logging Information Security Branch, Office of the Chief Information Officer Ministry of Citizens’ Services, Province of British Columbia http://www.cio.gov.bc.ca/cio/informationsec

Add to Reading List

Source URL: www.cio.gov.bc.ca

Language: English - Date: 2013-03-27 20:17:07
63Accountability / Voluntary Voting System Guidelines / Government / Electronic voting / Voting machine / Information technology security audit / Computer data logging / Election recount / Audit trail / Election technology / Politics / Elections

Data Exchange for Audit Information Joshua Franklin Peter Zelechoski VVSG View on Audit Logs

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2012-11-02 13:32:45
64Information technology management / Security / Computer data logging / Password / Log monitor / Event Viewer / Login / Backup / Telecommunications data retention / Data security / Computer security / Computing

OIT Standards for System Logging Table of Contents 1.0 Purpose.................................................................................................................................................1 2.0 Scope..

Add to Reading List

Source URL: info.alaska.edu

Language: English - Date: 2011-01-19 18:23:23
65Password / Computer data logging / Partition coefficient / Science / Computer forensics / Forensic Toolkit / Log analysis

Log Analysis for Incident Response Intermediate • One-Day Instructor-Led Course Artifacts left behind once an attack has been executed within a network environment can be found in many different places and can often se

Add to Reading List

Source URL: ad-pdf.s3.amazonaws.com

Language: English - Date: 2014-07-11 17:58:48
66Warranty / Geology / Computer file formats / Log ASCII Standard / Well logging

LOG ASCII STANDARD (LAS) FILE DATA The State Oil and Gas Board of Alabama (SOGB) is now distributing well geophysical log data through the Geological Survey of Alabama (GSA) in the Canadian Well Logging Society (CWLS) L

Add to Reading List

Source URL: www.ogb.state.al.us

Language: English - Date: 2012-10-04 16:06:11
67Security / Malware / Honeypot / Password / Zero-day attack / Secure Shell / Computer security / Operation Aurora / Keystroke logging / Computer network security / Cyberwarfare / Cybercrime

Detecting and Deterring Data Exfiltration Guide for Implementers February 2014 MWR would like to acknowledge the help and

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-06-10 10:45:29
68Computer security / Apache Software Foundation / Log4j / Syslog / Log analysis / Anomaly detection / Computer data logging / Tracing / Event data / Computing / Software / Network management

Invited Applications Paper Detecting Large-Scale System Problems by Mining Console Logs Wei Xu EECS Department, UC Berkeley

Add to Reading List

Source URL: www.icml2010.org

Language: English - Date: 2010-06-13 09:06:57
69ID-based encryption / Public-key cryptography / Database audit / Key / Computer data logging / Cipher / Proxy server / Cryptography / Computer security / Security

Building an Encrypted and Searchable Audit Log Brent R. Waters1∗, Dirk Balfanz2, Glenn Durfee2, and D. K. Smetters2 1 Princeton University Computer Science Department

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:20:46
70Flash file systems / Non-volatile memory / Memory management / Virtual memory / Flash memory / JFFS / YAFFS / USB flash drive / Solid-state drive / Computer hardware / Computer memory / Computing

Page-Differential Logging: An Efficient and DBMSIndependent Approach for Storing Data into Flash Memory Yi-Reun Kim Kyu-Young Whang [removed]

Add to Reading List

Source URL: dblab.kaist.ac.kr

Language: English - Date: 2010-09-21 07:08:45
UPDATE