Security log

Results: 472



#Item
61

2013 IEEE Security and Privacy Workshops Log Design for Accountability Denis Butin, Marcos Chicote and Daniel Le M´etayer Inria, Universit´e de Lyon INSA-Lyon, CITI-Inria

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-05-05 16:04:40
    62

    Students’ Steps to Enroll in the University of Tennessee’s Fee Payment Deferment Plan Log in to MyUTK Click on View/Pay Fees. A security warning box will appear, click on “YES”.

    Add to Reading List

    Source URL: onestop.utk.edu

    - Date: 2013-02-11 10:45:35
      63

      2010 Paper 7 Question 13 Security Woo & Lam proposed a protocol that would enable a client A to log on to a server B using an authentication service S. A→

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      - Date: 2014-06-09 10:18:35
        64Computing / System software / Internet protocols / Internet standards / Syslog / Computer security / Event Viewer / USENIX / Security log / System administration / Information technology management / Network management

        Short Topics in 12 System Administration Rik Farrow, Series Editor Building a Logging

        Add to Reading List

        Source URL: c59951.ssl.cf2.rackcdn.com

        Language: English - Date: 2011-12-21 13:02:02
        65Password / Login / Identity management systems / Password policy / Password manager / Security / Access control / Computer security

        Problem Logging In: There are two places where you can log in to ALZConnected: 1. On our home page at www.alzconnected.org: or our sign in page at www.alzconnected.org/signin.aspx:

        Add to Reading List

        Source URL: www.alzconnected.org

        Language: English - Date: 2015-01-27 09:39:33
        66Software / Tunneling protocols / Disk encryption / Windows Server / Windows Vista / OpenVPN / Virtual private network / BitLocker Drive Encryption / Hamachi / Computer network security / Computing / Computer security

        Lock down Your Laptop Smart Card Creating a Windows Login Password Lock your laptop by making sure that your Windows user account is set up to require a password on log- in. A log- in password won’t protect against an

        Add to Reading List

        Source URL: www.cannon.af.mil

        Language: English - Date: 2014-12-03 12:43:09
        67National security / University of California /  Irvine / Police / Prosecutor / Law / Legal professions / Government

        UCI Police Department Daily Crime & Fire Log – Case “Disposition” Definitions Case “Disposition” “Cleared by Adult Arrest/Juvenile Arrest”

        Add to Reading List

        Source URL: police.uci.edu

        Language: English - Date: 2015-03-11 21:28:11
        68Crime prevention / Surveillance / Law enforcement / Mass surveillance / Closed-circuit television / Internet privacy / Automation / Surveillance art / Information Awareness Office / Security / National security / Public safety

        WAKE UP : LOG ON by SEBASTIAN JANSEN

        Add to Reading List

        Source URL: bassartdotcom.files.wordpress.com

        Language: English - Date: 2014-09-19 16:36:28
        69Data security / Splunk / System administration / Workforce management / Software as a service / Infrastructure optimization / Cloud computing / Computing / Centralized computing / Management

        logentries.com Case Study Motus Motus uses Logentries to aggregate, monitor and alert in real-time on its log data across its services

        Add to Reading List

        Source URL: info.logentries.com

        Language: English - Date: 2015-02-20 14:56:56
        70Government / Identity document / Security / Identification

        Goodwin College Academic Advising Department Sonisweb Registration Instructions 1. Log on to www.goodwinsonisweb.com or click on the link under Current Students on the Goodwin College Website www.goodwin.edu . Then selec

        Add to Reading List

        Source URL: www.goodwin.edu

        Language: English - Date: 2015-04-30 14:53:00
        UPDATE