Log management

Results: 1038



#Item
561Access control / Identity management / Active Directory / Audit trail / User / Database security / Database audit / Security / Computer security / Computing

Auditing and Security Highlights Audit Trails: record changes to instrument terms data, static data and worksheets, as well as log-in attempts for audit purposes User access and permissions: control which users can view,

Add to Reading List

Source URL: www.derivation.co.uk

Language: English - Date: 2013-06-13 09:36:23
562Computing / Identity management / Remote desktop / Citrix Systems / Password

Logging in to Citrix 1.  Go to http://myapps.und.edu and log in with your IdM (Identity  Management) username and password.     Please go to https://idm.und.edu/idm/user/login.jsp if  needed to do

Add to Reading List

Source URL: und.edu

Language: English - Date: 2011-08-18 17:02:58
563Management / Firefighting in the United States / Incident Command System / Incident management

ACTIVITY LOG (ICS[removed]Operational Period: Date From: Time From: 1. Incident Name: 3. Name:

Add to Reading List

Source URL: www.fda.gov

Language: English
564Computing / Résumé / Cover letter / Patent application / Portable Document Format / Personal life / Employment / Recruitment / Management

FAQ’s for IASB Appli™ On-line application system: How do I apply for a position? Log- in at https://illinois.executivesearchservices.com/applicant/login.aspx Create a user name and password for yourself. You will nee

Add to Reading List

Source URL: www.iasb.com

Language: English - Date: 2011-05-10 10:50:45
565Information technology management / Security / Computer data logging / Password / Log monitor / Event Viewer / Login / Backup / Telecommunications data retention / Data security / Computer security / Computing

OIT Standards for System Logging Table of Contents 1.0 Purpose.................................................................................................................................................1 2.0 Scope..

Add to Reading List

Source URL: www.alaska.edu

Language: English - Date: 2011-01-19 18:23:23
566Multi-monitor / Intrusion detection system / Log monitor / Operating system / Information technology management / Computing / Audio engineering / Technology / Runtime verification / System administration / Display technology / Input/output

Detection of Intrusion Across Multiple Sensors William Long*a, Jon Doyleb, Glenn Burkea, and Peter Szolovitsa aLaboratory for Computer Science, Mass. Inst. Of Technology; bDept. of Computer Science, North Carolina State

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2003-04-17 13:36:44
567Government / Social Security number / Temporary work / Management / Human resource management / Criminal record / Background check

Ordering a Background Investigation 1. Go to https://apps.geninfo.com/Login.aspx?CompanyParm=IU and log in using your user ID and password. 2. The Notification and Access Security Requirement screen will appear. This scr

Add to Reading List

Source URL: hr.iu.edu

Language: English - Date: 2014-10-07 08:28:57
568Microsoft SharePoint / Google Chrome / Taskbar / Software / Document management systems / Password

Logging in to SharePoint for Students    ON CAMPUS:    Log in to a computer with your student account.  Navigate to  your program or instructor’s SharePoint site.  You can obtain  the 

Add to Reading List

Source URL: www.btc.ctc.edu

Language: English - Date: 2010-04-29 20:10:02
569DX Century Club / QSL / Public key certificate / Human behavior / Public-key cryptography / Logbook of The World / Key management

Diagnosing LoTW Logbook of The World accepts digitally signed log files called TQ8 files. The TQ8 files are created using TQSL software. The TQSL software uses digital Call Sign Certificates to sign the log file. The TQS

Add to Reading List

Source URL: www.arrl.org

Language: English - Date: 2013-10-31 13:36:23
570United States / Bureau of Land Management / United States Department of the Interior / Wildland fire suppression / National Environmental Policy Act / Land management / Surveying / Environment of the United States / Impact assessment / Conservation in the United States

RECORD OF PLAN CONFORMANCE AND CATEGORICAL EXCLUSION (CX) DETERMINATION CX Log #: DOI-BLM-ORV040[removed]CX CE Exemption category: 516 DM 11.9, E.9. Renewals and assignments of leases, permits, or rightsof-way where n

Add to Reading List

Source URL: www.blm.gov

Language: English - Date: 2014-08-01 16:43:51
UPDATE