000 04078cam a2200829 i 4500
001 on1028747456
003 OCoLC
005 20240523125540.0
006 m o d
007 cr cnu|||unuuu
008 180316t20182018inu ob 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dNLE
_dOCLCF
_dCNCGM
_dDG1
_dOCLCA
_dUMI
_dSTF
_dYDX
_dOCLCQ
_dOCLCO
_dUAB
_dUPM
_dTOH
_dOCLCQ
_dCEF
_dKSU
_dDEBBG
_dOCLCA
_dYOU
_dOCLCQ
_dOCLCO
_dG3B
_dRECBK
_dS9I
_dU3W
_dK6U
_dOCLCQ
_dOCLCO
_dD6H
_dESU
_dAU@
_dUKAHL
_dCOO
_dVT2
_dC6I
_dOCLCO
_dOCLCQ
_dOCLCA
_dUKMGB
_dBRF
_dOCLCQ
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
015 _aGBB7K9872
_2bnb
015 _aGBB7L2869
_2bnb
016 7 _a018589787
_2Uk
016 7 _a018592784
_2Uk
019 _a1029208280
_a1029243736
_a1029339371
_a1029340759
_a1031215673
_a1033615123
_a1033680560
_a1035364181
_a1035827050
_a1103252838
_a1153031724
_a1192345462
_a1240523980
020 _a9781119390879
_q(electronic bk.)
020 _a1119390877
_q(electronic bk.)
020 _a9781119390909
_q(electronic bk. ;
_qoBook)
020 _a1119390907
_q(electronic bk. ;
_qoBook)
020 _a9781119390893
_q(PDF ebook)
020 _a1119390893
_q(PDF ebook)
020 _z9781119390640
020 _z1119390648
029 1 _aAU@
_b000063618561
029 1 _aAU@
_b000065315030
029 1 _aCHNEW
_b001003210
029 1 _aCHVBK
_b516429213
029 1 _aGBVCP
_b1027307531
029 1 _aUKMGB
_b018592784
029 1 _aAU@
_b000073972626
035 _a(OCoLC)1028747456
_z(OCoLC)1029208280
_z(OCoLC)1029243736
_z(OCoLC)1029339371
_z(OCoLC)1029340759
_z(OCoLC)1031215673
_z(OCoLC)1033615123
_z(OCoLC)1033680560
_z(OCoLC)1035364181
_z(OCoLC)1035827050
_z(OCoLC)1103252838
_z(OCoLC)1153031724
_z(OCoLC)1192345462
_z(OCoLC)1240523980
037 _aCL0500000955
_bSafari Books Online
050 4 _aQA76.9.A25
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aMiroshnikov, Andrei,
_eauthor.
245 1 0 _aWindows security monitoring :
_bscenarios and patterns /
_cAndrei Miroshnikov.
264 1 _aIndianapolis, IN :
_bJohn Wiley & Sons, Inc.,
_c[2018]
264 4 _c�2018
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _adata file
500 _aIncludes index.
588 0 _aOnline resource; title from PDF title page (EBSCO, viewed March 21, 2018).
504 _aIncludes bibliographical references and index.
520 _aWith expert guidance to bring you up to speed on Windows auditing, logging, and event systems to help you exploit the full capabilities of these powerful components, this book offers scenariobased instruction providing clear illustration of how these events unfold in the real world. --
_cEdited summary from book.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
630 0 0 _aMicrosoft Windows (Computer file)
630 0 7 _aMicrosoft Windows (Computer file)
_2fast
650 0 _aComputer security.
650 2 _aComputer Security
650 6 _aS�ecurit�e informatique.
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer security
_2fast
650 7 _aComputersicherheit
_2gnd
758 _ihas work:
_aWindows security monitoring (Text)
_1https://id.oclc.org/worldcat/entity/E39PCFYJ8YMxMvHQP3pr7hM8wd
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_aMiroshnikov, Andrei.
_tWindows security monitoring.
_dIndianapolis, IN : John Wiley & Sons, Inc., [2018]
_z9781119390640
_z1119390648
_w(OCoLC)987796351
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119390909
938 _aAskews and Holts Library Services
_bASKH
_nAH32915605
938 _aAskews and Holts Library Services
_bASKH
_nAH32915606
938 _aEBSCOhost
_bEBSC
_n1733289
938 _aRecorded Books, LLC
_bRECE
_nrbeEB00744141
938 _aYBP Library Services
_bYANK
_n15322515
938 _aYBP Library Services
_bYANK
_n15224273
938 _aYBP Library Services
_bYANK
_n15229508
994 _a92
_bINLUM
999 _c12506
_d12506