Security log

Results: 472



#Item
71Ethics / Risk analysis / Project management / Actuarial science / Information technology management / IT risk / Risk management / Risk register / Management / Risk / Security

Project Risk Report 2 Risk Report (To be used with DoIT Risk and Issues Log Template)

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2011-07-21 15:53:25
72Computing / Password / Tap / Software / Security token / One-time password / Apple Inc. / IPhone

I. What is OTP? ОТР /One Time Password/ is encryption software based on smartphone, will be used for securely log into your online banking service.

Add to Reading List

Source URL: www.ebank.mn

Language: English - Date: 2014-05-21 03:45:43
73National security / Surveillance / Public safety / Digital video recorders / Security / Law enforcement

Licensee/License Number: SURVEILLANCE SYSTEM LOG Date Time

Add to Reading List

Source URL: www.nmgcb.org

Language: English - Date: 2014-11-18 11:50:42
74Computing / ISO/IEC 27002 / Information security / ISO/IEC 27001 / Security controls / Business continuity / NIST Special Publication 800-53 / Data security / Security / Computer security

Information security implementation in the registry systems. Note by the administrator of the international transaction log.

Add to Reading List

Source URL: unfccc.int

Language: English - Date: 2015-04-13 12:26:34
75Computer network security / Computer networking / Internet privacy / Network performance / Proxy server / Macro / Denial-of-service attack / X-Forwarded-For / Common Log Format / Computing / Computer programming / Software engineering

Gardol Adaptive Denial of Service Attack Mitigation by John Walker March 2004 Contents

Add to Reading List

Source URL: www.fourmilab.ch

Language: English - Date: 2004-03-26 15:04:20
76HTTP / World Wide Web / Computer network security / Server log / Proxy server / Common Log Format / HTTP cookie / Malware / HTTP Secure / Computing / Internet / Internet privacy

Stealth Attack – Detection and Investigation Ryan Jones and Thomas Mackenzie 25th NovemberW. Madison Street, Suite 1050 Chicago, ILCopyright © 2011 Trustwave Holdings, Inc. All rights reserved.

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:39
77Privacy / Technology / Crime prevention / National security / BlackBerry / Audit / Transaction log / Surveillance / Inventory / Information appliances / Personal digital assistants / Security

BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM AUDIT OF BLACKBERRY AND CELL PHONE INTERNAL CONTROLS

Add to Reading List

Source URL: oig.federalreserve.gov

Language: English - Date: 2015-01-21 10:08:59
78Cyberwarfare / Hacking / Fox-IT / Surveillance / Computer law / Computer security / Forensic science / Legal aspects of computing / Stuxnet / Security / Law enforcement / Computing

nr 2 augustDigital expertise in the courtroom incident response Speed, expertise and log files make the difference p4 no delays Analyse digital evidence yourself with Tracks Inspector p18

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2015-04-22 11:55:08
79ID-based encryption / Public-key cryptography / Database audit / Key / Computer data logging / Cipher / Proxy server / Cryptography / Computer security / Security

Building an Encrypted and Searchable Audit Log Brent R. Waters1∗, Dirk Balfanz2, Glenn Durfee2, and D. K. Smetters2 1 Princeton University Computer Science Department

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:31
80Computer security / Windows NT / Windows Server / Log analysis / Event Viewer / Microsoft Servers / Event data / Windows / System Center Operations Manager / Software / System software / Computing

DATASHEET Event Log Management for Security and Compliance Keeping track of user and administrator activity is at the heart of keeping your environment secure and complying with various IT regulations. Historically, mon

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:22:32
UPDATE