Search
Now showing items 1-1 of 1
Recovery Based Architecture To Protect Hids Log Files Using Time Stamps
(ACADEMY PUBLISHER, 2010)
After the great revolution in the field of Information Technology, many applications made necessity to run computer systems (either servers or client machines) all the time. Along with improvements and new inventions
in ...