Monitoring Usage of Workstations with a Relational Database
LISA '94 Proceedings of the 8th USENIX conference on System administration
Monitoring Usage of Workstations with a Relational Database
LISA '94 Proceedings of the 8th USENIX conference on System administration
Splat: A Network Switch/Port Configuration Management Tool
LISA '03 Proceedings of the 17th USENIX conference on System administration
Hi-index | 0.00 |
Determining how you were attacked is essential to developing a response or countermeasure. Usually, a system or network manager presented with a successful intrusion has very little information with which to work: a possibly corrupted system log, a firewall ...