Designing Secure Web-Based Applications for Microsoft Windows 2000 with CDROM
Every security solution requires some degree of debugging, and the goal of this chapter is to make it much easier to find a solution to your debugging issues.
The chapter is divided into four parts:
- Tools and logs available to you
- The art of reading a Windows 2000 logon event
- The art of reading an Internet Information Services (IIS) log entry
- Problems and solutions