|
|
|
|
|
Windows Security Monitoring: Scenarios and Patterns
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you... | | Web Mobile-Based Applications for Healthcare ManagementIn recent years, there has been a veritable literary frenzy on the theme of healthcare and the Internet. In these works, however, there has not been adequate attention paid to the role that potential users of the site (patients, general practitioners, healthcare personnel, students, private doctors, other healthcare organizations, etc.) could and... | | Computational Studies of Human Motion: Part 1, Tracking and Motion SynthesisComputational Studies of Human Motion: Part 1, Tracking and Motion Synthesis reviews methods for kinematic tracking of the human body in video. The review confines itself to the earlier stages of motion, focusing on tracking and motion synthesis. There is an extensive discussion of open issues. The authors identify some puzzling phenomena... |
|
|
|
|
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 |