 |
|
 Windows Security Monitoring: Scenarios and Patterns
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you... |  |  Hybrid Electric Vehicle System Modeling and Control (Automotive Series)
This new edition includes approximately 30% new materials covering the following information that has been added to this important work:
- extends the contents on Li-ion batteries detailing the positive and negative electrodes and characteristics and other components including binder, electrolyte, separator and foils, and the... |  |  |
|
|
|
|
Result Page: 216 215 214 213 212 211 210 209 208 207 206 205 204 203 202 201 200 199 198 |