47:
According to Stefan
Axelsson, "Most UNIX installations do not run any form of security logging software, mainly because the security logging facilities are expensive in terms of disk storage, processing time, and the cost associated with analyzing the audit trail, either manually or by special
67:
40:
131:
72:
35:
87:
112:
31:
is used to track security-related information on a computer system. Examples include:
125:
82:
77:
57:
62:
17:
92:
8:
104:
7:
113:An Approach to UNIX Security Logging
25:
68:Log management and intelligence
1:
41:Internet Connection Firewall
148:
73:Web log analysis software
36:Windows Security Log
132:Computer security
111:Stefan Axelsson,
88:Common Log Format
16:(Redirected from
139:
116:
109:
21:
147:
146:
142:
141:
140:
138:
137:
136:
122:
121:
120:
119:
110:
106:
101:
54:
23:
22:
15:
12:
11:
5:
145:
143:
135:
134:
124:
123:
118:
117:
103:
102:
100:
97:
96:
95:
90:
85:
80:
75:
70:
65:
60:
53:
50:
45:
44:
38:
24:
14:
13:
10:
9:
6:
4:
3:
2:
144:
133:
130:
129:
127:
114:
108:
105:
98:
94:
91:
89:
86:
84:
81:
79:
76:
74:
71:
69:
66:
64:
61:
59:
56:
55:
51:
49:
42:
39:
37:
34:
33:
32:
30:
19:
107:
83:Data logging
46:
43:security log
29:security log
28:
26:
18:Security Log
78:Web counter
58:Audit trail
48:software."
99:References
63:Server log
126:Category
52:See also
93:Syslog
128::
27:A
115:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.