January 2018
Intermediate to advanced
384 pages
10h 6m
English
The types of logs available in an operating system may vary; in this book, we will focus on core logs that are relevant from a security perspective. We will use Windows and Linux operating systems to demonstrate that.
Read now
Unlock full access