Windows Security Monitoring: Scenarios and Patterns
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...
Raspberry Pi Embedded Projects Hotshot
This book is targeted towards beginners and intermediate designers of mechatronic systems and embedded system design. Some familiarity with the Raspberry Pi and Python programming is preferred but not required.
The Raspberry Pi is a quaint example of technological innovations that come by once every two or three decades and set off...
|Result Page: 44 43 42 41 40 39 38 37 36 35 |