PA-4.1 Administrators Guide
How to Leverage Log Data for Effective Threat Detection
SpiceWorks Webinar: Whose logs, what logs, why logs
Building a data driven search application with LucidWorks SiLK
Cyber Disruption: Probability and Response Readiness WSEMA September 18, 2013.
Symantec 2004 Pulse of IT Security in Canada Volume II Survey shows Increases in Concern and Spending for IT Security Andrew Bisson Director, Planning.
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 XMPP-Grid for SACM Information Transport XMPP Protocol Extensions for Use.
Ceh.v6. .module.04.google.hacking.1
Whose Logs, What Logs, Why Logs - Your Quickest Path to Security Visibility
Defence in Depth
Unix Web servers and FireWall
Log management with Graylog2 - FrOSCon 2012