Windows Security Monitoring: Scenarios and Patterns
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...
Applied Network Security
Master the art of detecting and averting advanced network security attacks and techniques
About This Book
Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
Become an expert in cracking WiFi...