June 2012
Intermediate to advanced
696 pages
22h 58m
English
Many excellent books have been written about responding to computer incidents, but the majority of these books discuss the topic in broad terms without addressing the specifics of any given platform. This book takes the next step in dealing directly with networks that rely primarily on Microsoft products to provide the majority of their core network functions.
The primary obstacle faced by security practitioners of Microsoft-based networks is the proprietary and closed nature of the source code. Unlike open-source alternatives, Microsoft’s products are distributed only as compiled executables without any accompanying source code. As a result, in order for anyone to determine how the ...
Read now
Unlock full access