Using logs for forensics after a data breach

08.11.2010

in Network World's Wide Area Network section.