|
A cop on the beat: collecting and appraising intrusion evidence
Pages 46-52
|
Categories and Subject Descriptors:
Computing Milieux -Management of Computing and Information Systems - Security and Protection (K.6.5): Unauthorized access (e.g., hacking, phreaking);
Computer Systems Organization -Computer-Communication Networks - General (C.2.0): Security and protection (e.g., firewalls);
General Terms:
Management,
Security
The Digital Library is published by the Association for Computing Machinery. Copyright © 1999, 2000 ACM, Inc.
This page was last updated Thu, 10 Aug. 2000 12:56 -0500
.
| ||
|