Server log

Results: 188



#Item
31Computing / Microsoft SQL Server / Data / SQL / Database / Microsoft Data Access Components / Relational database management systems / Database management systems / Data management

Chapter 5 AppMetrics Reports An application monitor generates large amounts of data and stores them in log file format. To view this data in a manageable and meaningful way, AppMetrics Reports can display the data in var

Add to Reading List

Source URL: www.xtremesoft.com

Language: English - Date: 2011-08-09 22:19:08
32HTTP / World Wide Web / Computer network security / Server log / Proxy server / Common Log Format / HTTP cookie / Malware / HTTP Secure / Computing / Internet / Internet privacy

Stealth Attack – Detection and Investigation Ryan Jones and Thomas Mackenzie 25th NovemberW. Madison Street, Suite 1050 Chicago, ILCopyright © 2011 Trustwave Holdings, Inc. All rights reserved.

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:39
33Financial economics / Fax server / Electronic commerce / Fax / Payment systems / Internet fax / Credit card fraud / Technology / Business / Credit card

New account order form e-mail address ______________________________________________ - this will be your log in / user name (all faxes arrive here) Existing FAXtopia # (for renewals) _____________________________ Billing

Add to Reading List

Source URL: www.faxtopia.com

Language: English - Date: 2012-03-13 12:39:07
34PostgreSQL / Data / Point-in-time recovery / Secure Shell / Kerberos / Log shipping / Software / Cross-platform software / Computing

PostgreSQL Reference Manual Volume 3: Server Administration Guide for versionJuneThe PostgreSQL Global Development Group

Add to Reading List

Source URL: www.network-theory.co.uk

Language: English - Date: 2010-12-16 14:38:19
35Network architecture / Internet privacy / Computer networking / Network performance / SOCKS / Proxy server / Internet standards / Transmission Control Protocol / Port / Computing / Internet / Internet protocols

Inferno Nettverk A/S Dante Technical Specification 1 Data Traffic Log Format

Add to Reading List

Source URL: www.inet.no

Language: English - Date: 2011-03-21 09:29:07
36Software / Relational database management systems / Cross-platform software / Microsoft SQL Server / Windows Server System / Log shipping / Database / SQL Azure / Microsoft Servers / Database management systems / Microsoft / Data management

PDF Document

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2013-08-28 13:03:34
37ID-based encryption / Public-key cryptography / Database audit / Key / Computer data logging / Cipher / Proxy server / Cryptography / Computer security / Security

Building an Encrypted and Searchable Audit Log Brent R. Waters1∗, Dirk Balfanz2, Glenn Durfee2, and D. K. Smetters2 1 Princeton University Computer Science Department

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:31
38Computer security / Windows NT / Windows Server / Log analysis / Event Viewer / Microsoft Servers / Event data / Windows / System Center Operations Manager / Software / System software / Computing

DATASHEET Event Log Management for Security and Compliance Keeping track of user and administrator activity is at the heart of keeping your environment secure and complying with various IT regulations. Historically, mon

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:22:32
39System software / Adobe Flash Media Server / Wowza Media Server / Server / Computing / Web analytics / Software / Sawmill

Multiple Media Server Log File Integration A Case Study Using Sawmill November 2010

Add to Reading List

Source URL: www.sawmill.net

Language: English - Date: 2010-12-23 20:34:17
40Internet / System software / Web analytics / Software architecture / Data collection / Web mining / HTTP cookie / Proxy server / Server log / Computing / Internet privacy / Human–computer interaction

A Framework for Efficient and Anonymous Web Usage Mining Based on Client-Side Tracking Cyrus Shahabi and Farnoush Banaei-Kashani Department of Computer Science, Integrated Media Systems Center, University of Southern Cal

Add to Reading List

Source URL: infolab.usc.edu

Language: English - Date: 2009-11-05 01:09:05
UPDATE