Event Viewer

Results: 66



#Item
11Analyzing Audit Trails in the Aeolus Security Platform by Aaron Blankstein S.B., C.S. M.I.T., 2010 S.B., Mathematics M.I.T., 2010

Analyzing Audit Trails in the Aeolus Security Platform by Aaron Blankstein S.B., C.S. M.I.T., 2010 S.B., Mathematics M.I.T., 2010

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2011-06-01 15:48:26
12DATASHEET  Event Log Management for Security and Compliance Keeping track of user and administrator activity is at the heart of keeping your environment secure and complying with various IT regulations. Historically, mon

DATASHEET Event Log Management for Security and Compliance Keeping track of user and administrator activity is at the heart of keeping your environment secure and complying with various IT regulations. Historically, mon

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:22:32
13Solutions: Windows Event Logs, Syslog, SNMP Traps

Solutions: Windows Event Logs, Syslog, SNMP Traps

Add to Reading List

Source URL: www.heroix.com

Language: English - Date: 2008-07-30 10:12:01
14Why Application Availability Matters

Why Application Availability Matters

Add to Reading List

Source URL: www.xtremesoft.com

Language: English - Date: 2009-06-20 21:29:06
15Accessing Variability in Climate Data: a Significant Event Viewer Tool

Accessing Variability in Climate Data: a Significant Event Viewer Tool

Add to Reading List

Source URL: ensembles-eu.metoffice.com

Language: English - Date: 2014-08-15 09:37:10
16Cloudera Governance  Important Notice (cCloudera, Inc. All rights reserved. Cloudera, the Cloudera logo, Cloudera Impala, and any other product or service names or slogans contained in this document are trad

Cloudera Governance Important Notice (cCloudera, Inc. All rights reserved. Cloudera, the Cloudera logo, Cloudera Impala, and any other product or service names or slogans contained in this document are trad

Add to Reading List

Source URL: www.cloudera.com

Language: English - Date: 2015-04-18 07:17:33
17IMDIS 2013 September 2013 Poster #170  R2R Science EventLogger: Supporting Data Interoperability with Controlled Vocabularies http://rvdata.us/

IMDIS 2013 September 2013 Poster #170 R2R Science EventLogger: Supporting Data Interoperability with Controlled Vocabularies http://rvdata.us/

Add to Reading List

Source URL: imdis2013.seadatanet.org

Language: English
18GFI White Paper  How to perform network-wide security event log monitoring Using GFI EventsManagerâ„¢ for intrusion detection and essential auditing of security event logs

GFI White Paper How to perform network-wide security event log monitoring Using GFI EventsManagerâ„¢ for intrusion detection and essential auditing of security event logs

Add to Reading List

Source URL: www.gfi.com

Language: English - Date: 2011-06-05 06:16:02
19Smart Archive  Access to logs in time An intelligent solution

Smart Archive Access to logs in time An intelligent solution

Add to Reading List

Source URL: www.tier-3.com

Language: English - Date: 2015-01-14 19:39:02
20BlackStratus LOG Storm SIEM Appliances Flexible and affordable, yet remarkably powerful, LOG Storm combines log management and security information management on a single easy-to-install, simple-to-use appliance. BlackSt

BlackStratus LOG Storm SIEM Appliances Flexible and affordable, yet remarkably powerful, LOG Storm combines log management and security information management on a single easy-to-install, simple-to-use appliance. BlackSt

Add to Reading List

Source URL: www.blackstratus.com

Language: English - Date: 2014-04-08 16:03:52