Guide to Computer Security Log Management
GPTKB entity
Statements (18)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:publisher
gptkb:NIST_Special_Publication |
| gptkbp:author |
Karen Kent
Johannes Wack John Stine Murkay Souppaya |
| gptkbp:language |
English
|
| gptkbp:NISTPublicationNumber |
SP 800-92
|
| gptkbp:publicationDate |
2006
|
| gptkbp:publishedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
| gptkbp:subject |
computer security
information security log management |
| gptkbp:url |
https://csrc.nist.gov/publications/detail/sp/800-92/final
|
| gptkbp:bfsParent |
gptkb:Karen_Scarfone
gptkb:Publication_1212 |
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
Guide to Computer Security Log Management
|