z-logo
open-access-imgOpen Access
Guide to computer security log management
Author(s) -
Karen Kent,
Murugiah Souppaya
Publication year - 2006
Language(s) - Uncategorized
Resource type - Reports
DOI - 10.6028/nist.sp.800-92
Subject(s) - outreach , nist , implementation , government (linguistics) , order (exchange) , information security , identification (biology) , computer science , technical standard , engineering management , computer security , public relations , engineering , business , political science , software engineering , finance , linguistics , philosophy , botany , natural language processing , law , biology , operating system

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here