Pinpointing System Performance Issues

  • Authors:
  • Douglas L. Urner

  • Affiliations:
  • Berkeley Software Design, Inc.

  • Venue:
  • LISA '97 Proceedings of the 11th USENIX conference on System administration
  • Year:
  • 1997

Quantified Score

Hi-index 0.00

Visualization

Abstract

Determining how you were attacked is essential to developing a response or countermeasure. Usually, a system or network manager presented with a successful intrusion has very little information with which to work: a possibly corrupted system log, a firewall ...