Security Log Management: Identifying Patterns in the Chaos Logs, logs, logs. Ever since I started taking my first steps in the world of security,
it has been clear that “the log” plays a crucial—and sometimes undervalued—
role in the security management of any IT infrastructure.This fact
alone explains the plethora of tools, applications, and solutions whose only...
MDX with Microsoft SQL Server 2008 R2 Analysis Services Cookbook
MDX-related books often dedicate a significant part of their content to explaining the concepts of multidimensional cubes, the MDX language and its functions, and other specifics related to working with Analysis Services. And that's perfectly fine, there should be books like that, the tutorials that teach the concepts. However, that also...
New Approaches to International Law: The European and the American Experiences
Everywhere we can see the impact of things foreign and far away. People
everywhere feel vulnerable to global economic and political forces. But how do
these things threaten us and what levers are available to respond? So much about
global society remains obscure. What holds it together? How much is chaos, how
much system? How are...
|Result Page: 9 8 7 6 5 4 3 2 1 |