Linked e-resources
Details
Table of Contents
pt. 1. Understanding and exploiting Windows networks
pt. 2. Analyzing the computer
pt. 3. Analyzing the logs
pt. 4. Results, the cloud, and virtualization
pt. 5. Appendices.
pt. 2. Analyzing the computer
pt. 3. Analyzing the logs
pt. 4. Results, the cloud, and virtualization
pt. 5. Appendices.