(The security statistics and log analysis are expounded, and suggestions are made for the deployment of security statistics systems in enterprises. This document includes the following attachments:
Information System Security Technology--Security Statistics and Log Analysis.pdf)