Technologies by Jongman Kim
Apparatus and Method for Protecting Log Information
A combined approach that limits cyber intruders from altering systems logs, including those who have managed to obtain root access
A combined approach that limits cyber intruders from altering systems logs, including those who have managed to obtain root access
6327
Learn more about Jongman Kim