Ein Logarchiv zur Verfolgung von Sicherheitsangriffen in digitalen Vermittlungsnetzen
暂无分享,去创建一个
[1] Fred Halsall,et al. Data communications, computer networks and open systems (3. ed.) , 1995, Electronic-systems engineering series.
[2] Michael Emanuel. Open Management - Addressing Real Business Needs , 1994, Proceedings of NOMS '94 - IEEE Network Operations and Management Symposium.
[3] Ingrid Schaumüller-Bichl. Sicherheitsmanagement - Risikobewältigung in informationstechnologischen Systemen , 1992, Sicherheit in der Informations- und Kommunikationstechnik.
[4] Udo W. Pooch,et al. Cooperating security managers: Distributed intrusion detection systems , 1996, Comput. Secur..
[5] Fred Halsall,et al. Data communications, computer networks and open systems (3. ed.) , 1995, Electronic-systems engineering series.
[6] Randy H. Katz,et al. A case for redundant arrays of inexpensive disks (RAID) , 1988, SIGMOD '88.
[7] Markus Tresch. Middleware: Schlüsseltechnologie zur Entwicklung verteilter Informationssysteme , 1996, Informatik-Spektrum.
[8] Markus Wersch. Anwendung, Konzeption und Entwurf eines Werkzeugs zur Koordination komplexer, betrieblicher Arbeitsprozesse , 1994 .
[9] Keith Willetts. Service Management - the Drive for Re-Engineering , 1994, Proceedings of NOMS '94 - IEEE Network Operations and Management Symposium.
[10] Alexander Schill. Cooperative office systems : concepts and enabling technologies , 1995 .
[11] Louise Crawford,et al. The Audit Process: Principles, Practice and Cases , 1999 .
[12] Uyless D. Black. Network Management Standards: SNMP, CMIP, TMN, MIBs and Object Libraries , 1992 .
[13] Jane Hall,et al. Management of Telecommunication Systems and Services , 1996, Lecture Notes in Computer Science.