Windows Security Monitoring: Scenarios and Patterns
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...
Applied SOA: Service-Oriented Architecture and Design Strategies You need more than theory to make SOA work.
You need this practical guide.
The challenge today's IT professionals face is not how to build a service. It's how to build a quality service, based on solid design principles and integrated into an architecture that enhances overall business...
|Result Page: 144 143 142 141 140 139 138 137 136 135 |