pt. 1. Understanding and exploiting Windows networks -- pt. 2. Analyzing the computer -- pt. 3. Analyzing the logs -- pt. 4. Results, the cloud, and virtualization -- pt. 5. Appendices.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries