arrow Communications of the ACM
arrow Volume 42 , Issue 7 (1999)

access SIGs conferences publication page subscription page

A cop on the beat: collecting and appraising intrusion evidence
Pages 46-52

Terrance Goan

metadata:   index terms  
rule rule rule rule
full text:   pdf 191 KB

back to top
blue HR


Categories and Subject Descriptors:
Computing Milieux -Management of Computing and Information Systems - Security and Protection (K.6.5): Unauthorized access (e.g., hacking, phreaking); Computer Systems Organization -Computer-Communication Networks - General (C.2.0): Security and protection (e.g., firewalls);

General Terms:
Management, Security

blue HR