Security log

Results: 472



#Item
91Computer security

Log Analyser Much more than compliance With growing pressure to comply with tighter regulations and desire to improve security, there is growing need to log all system activity and transactions, not just most of them. I

Add to Reading List

Source URL: www.tier-3.com

Language: English - Date: 2015-01-14 19:38:50
    92Identity document / Goodwood Island / Identification / Government / Maritime Security Identification Card / Msic / Security / Yamba

    FOR-OFFICIAL-USE-ONLY GOODWOOD ISLAND FACILITY – VISITOR LOG PAGE #: (Office record consecutive number)

    Add to Reading List

    Source URL: www.yambaport.com.au

    Language: English - Date: 2015-02-12 23:49:14
    93National security / University of California /  Irvine / Police / Prosecutor / Law / Legal professions / Government

    UCI Police Department Daily Crime & Fire Log – Case “Disposition” Definitions Case “Disposition” “Cleared by Adult Arrest/Juvenile Arrest”

    Add to Reading List

    Source URL: www.police.uci.edu

    Language: English - Date: 2015-03-11 21:28:11
    94McAfee / Network management / System administration / Data security / Security information and event management / Security event manager / Log analysis / Syslog / Payment Card Industry Data Security Standard / Computing / Information technology management / Computer security

    Data Sheet McAfee Enterprise Log Manager Reduce compliance costs with automated log collection,

    Add to Reading List

    Source URL: www.mcafee.com

    Language: English - Date: 2015-03-13 18:46:38
    95Computer security / Computing / Science / Log analysis / Computer data logging / Partition coefficient

    Workshop on the Analysis of System Logs (WASLCall for Papers October 14, 2009 Big Sky, MT (at SOSP) FULL PAPER SUBMISSION: Monday, June 29th, 2009 AUTHOR NOTIFICATION: Monday, July 27, 2009

    Add to Reading List

    Source URL: www.sigops.org

    Language: English - Date: 2009-03-17 13:23:47
    96Internet privacy / Public key certificate / Password / USB flash drive / Computing / Software / Computer security / Features new to Windows XP / HTTP / Public-key cryptography / HTTP cookie

    Unable to log in This user guide will help you to create your personal certificate in file/browser or smart card certificate. If you already own a personal certificate in file that you have saved on your computer, you w

    Add to Reading List

    Source URL: www.mojebanka.cz

    Language: English - Date: 2014-01-29 02:32:53
    97Security / Security information and event management / Security event manager / ArcSight / Log analysis / Splunk / Technology / Computer security / Data security / Computing

    zscaler-nanolog-streaming-service-datasheet

    Add to Reading List

    Source URL: www.zscaler.com

    Language: English - Date: 2015-04-01 12:38:27
    98Computing / Public safety / GFI Software / Windows Security Log / Windows / Network security / Backup / Event Viewer / Log monitor / Computer security / Security / Data security

    GFI White Paper How to perform network-wide security event log monitoring Using GFI EventsManager™ for intrusion detection and essential auditing of security event logs

    Add to Reading List

    Source URL: www.gfi.com

    Language: English - Date: 2011-06-05 06:16:02
    99Public-key cryptography / Cocks IBE scheme / Ciphertext indistinguishability / XTR / Diffie–Hellman key exchange / Random oracle / Cipher / Boneh/Franklin scheme / Feistel cipher / Cryptography / ID-based encryption / Advantage

    On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2009-10-12 12:17:42
    100Credit cards / Information technology management / Electronic commerce / Computer security / Computer law / Payment Card Industry Data Security Standard / GFI Software / Payment card industry / Information security / Computing / Payment systems / Data privacy

    Microsoft Word - automated-event-log-management-for-pci-dss.doc

    Add to Reading List

    Source URL: www.gfi.com

    Language: English - Date: 2009-06-26 06:27:20
    UPDATE