A Log System Based on Composite Design Pattern;
基于组成设计模式的日志系统
This being said,the log system,due to the limit of web explorer and system resources,is falling short to the system performance and customer needs.
目前,几乎所有大型Web的应用都考虑在系统中实现日志系统,但是由于受浏览器及系统资源等方面的限制,此系统在系统性能和用户满意度方面都不尽如人意。
Secondly, it analyzes three representative information source--system audit record, system log and application log.
介绍了入侵检测系统的由来和通用的检测模型,入侵检测的概念、分类及主机型入侵检测系统的工作原理,进而分析了审核记录、系统日志、应用程序日志三种典型的信息源,并以SolarisBSM、Windows 2 0 0 0为例,在实验的基础上,对审核记录进行了深入分
Therefore, the security of system log data is directly related to .
计算机系统日志主要提供系统和网络状态的信息报告,网络中的入侵者通过删除、篡改系统日志来销毁被攻击系统上的操作记录,躲避系统管理员和专业人员的追踪、审计和取证,因此,系统日志的安全直接关系到计算机系统的安全。
We used the host system log as main data source to analyze with frequent pattern data mining.
本文提出一种基于频繁模式数据挖掘的方法,主要以主机系统日志作为数据源,对其进行频繁模式挖掘分析,实现了基于主机的入侵检测模型的设计。
Key technologies in automatic system of wide stainless steel hot strip set;
宽幅不锈钢带热连轧机组自动化系统关键技术
Thinking on construction of power dispatching automatic system after ice disaster;
对江西电网调度自动化系统建设的思考
Design and application of power station integrated automatic system;
电站综合自动化系统的设计及应用
A review to the automation system functions of continuous bar mill and its development(A);
小型连轧机组自动化系统功能述评和技术发展(上)
Research of automation system in general hospital;
医疗综合楼自动化系统的研究
On the design of office automation system in intelligent buildings;
浅谈智能建筑中办公自动化系统的设计
Checking and accepting of the main dam s security monitoring automatization system project;
大坝安全监测自动化系统工程的验收
Log system design in support of linkage analysis of security audit and computer forensics
支持审计与取证联动的日志系统设计
Design of MCU Log System Base on Serial Port Communication
基于串口通信的单片机日志系统设计
The security log file is full, logging must be disabled to continue using the system. However, a problem prevented the disabling of logging.
安全日志文件已满,必须停用日志以继续使用系统。然而,某一问题使得系统无法停用日志。
The system maintains logs for the most recent 30 days.
系统会保存最近 30 天的日志。
This sample log provides an overview of system performance.
此日志样本提供了系统性能概述。
The time at which the system logged this entry to the event log.
系统将此项记录到事件日志中的时间。
System could not allocate the required space in a registry log.
系统无法分配注册表日志中所需空间。
The system maintains log for the most recent 30 days.
系统会保持最近 30 天中的日志。
Research on Secure Analysis of Network Services System Logs;
网络服务系统日志安全分析技术研究
Research and Implementation of Web Usage Mining System Model;
web日志挖掘系统模型研究与设计
Design and Implementation of Log Analysis System for Linux;
Linux环境下日志分析系统的设计与实现
The Design and Implementation Based on Web Log Mining System;
基于Web日志挖掘系统的设计与实现
The Design and Implementation of Journaling Filesystem on KYLIN;
银河麒麟日志文件系统的设计与实现
Research on Intelligent Recommendation System Based on Web Log Mining;
基于Web日志挖掘的智能推荐系统研究
Reseach on Related Algorithms Used in Web Log Mining System;
Web日志挖掘系统中相关算法的研究
Research on the Key Technology of the Distributed Log Server System;
分布式日志服务系统关键技术的研究
The Design and Implementation of the Generalized Firewall Log Analytical System;
通用防火墙日志分析系统设计及实现
Research on Log Management System and Implementation in Oscar;
日志管理系统研究及其在OSCAR中的实现
CopyRight © 2020-2024 优校网[www.youxiaow.com]版权所有 All Rights Reserved. ICP备案号:浙ICP备2024058711号