Computer data logging

Results: 86



#Item
71XML / Computing / Computer file formats / Technical communication

TRS OTCnet Data Implementation Impacts INTRODUCTION TRS provides a standard set of reports that users can select after logging into TRS using the Business Objects software. These standard reports provide the ability for

Add to Reading List

Source URL: fms.treas.gov

Language: English - Date: 2013-01-07 07:45:25
72XML / Computing / Computer file formats / Technical communication

TRS OTCnet Data Implementation Impacts INTRODUCTION TRS provides a standard set of reports that users can select after logging into TRS using the Business Objects software. These standard reports provide the ability for

Add to Reading List

Source URL: fms.treas.gov

Language: English - Date: 2013-01-07 07:45:13
73Cyberwarfare / Spyware / Backup / Computer virus / Computer security / Password / Keystroke logging / Access control / Malware / Security / Espionage / Computer network security

Recommended Practices for Safeguarding Access to Confidential Data

Add to Reading List

Source URL: www.cdph.ca.gov

Language: English - Date: 2014-09-10 11:46:16
74Network management / System administration / Internet protocols / Internet standards / Computer data logging / Syslog / Tail / CUPS / Log / Computing / System software / Software

PDF Document

Add to Reading List

Source URL: docs.kde.org

Language: English - Date: 2014-08-21 04:37:08
75Auditing / Public safety / Prevention / Information technology security audit / Management / Health Insurance Portability and Accountability Act / Information security / Audit / Security information and event management / Computer security / Security / Data security

Logging and Auditing in a Healthcare Environment Mac McMillan CEO CynergisTek, Inc. OCR/NIST HIPAA Security Rule Conference Safeguarding Health Information: Building Confidence

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-05-13 01:00:00
76Data security / System software / Log analysis / Network security / Server log / Proxy server / Security information and event management / Telecommunications data retention / Keystroke logging / Computer security / Computing / Security

Effective Log Management www.contextis.com About Introduction

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-05-16 06:14:12
77Warranty / Geology / Computer file formats / Log ASCII Standard / Well logging

LOG ASCII STANDARD (LAS) FILE DATA The State Oil and Gas Board of Alabama (SOGB) is now distributing well geophysical log data through the Geological Survey of Alabama (GSA) in the Canadian Well Logging Society (CWLS) L

Add to Reading List

Source URL: www.gsa.state.al.us

Language: English - Date: 2012-10-04 16:06:11
78Computer data logging / Computer security / Log monitor / System administration / Log analysis

Tab B Return on Investment Program Funding Application For FY 10 Contact Information:

Add to Reading List

Source URL: das.ite.iowa.gov

Language: English - Date: 2010-09-20 19:16:33
79Accountability / Voluntary Voting System Guidelines / Government / Electronic voting / Voting machine / Information technology security audit / Computer data logging / Election recount / Audit trail / Election technology / Politics / Elections

Data Exchange for Audit Information Joshua Franklin Peter Zelechoski VVSG View on Audit Logs

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-03-19 12:25:18
80Computer data logging / Log analysis / Data / Audit trail / Database / Email / Transaction log / Log management and intelligence / Database management systems / Computing / Data management

Aardvark Secure Solution Brief

Add to Reading List

Source URL: www.d2k.com

Language: English - Date: 2005-10-07 07:43:16
UPDATE