11. Effective Threat Investigation for SOC Analysts : The ultimate guide to examining various threats and attacker techniques using security logs /: The ultimate guide to examining various threats and attacker techniques using security logs. (2023) Authors: Yahia, Mostafa Record Type: Book Extent: 1 online resource (314 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
12. InstantTeam Foundation Server 2012 and Project Server 2010 Integration How-to. (2013) Authors: Gauvin, Gary P Record Type: Book Extent: 1 online resource (54 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
13. Learning VMware NSX. (2016) Authors: Thakurratan, Ranjit Singh Record Type: Book Extent: 1 online resource (220 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
14. Instant Rainmeter Desktop Customization Tool How-to. (2013) Authors: Lim, Ken Record Type: Book Extent: 1 online resource (70 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
15. Getting started with Red Hat enterprise virtualization : leverage powerful Red Hat Enterprise Virtualization solutions to build your own IaaS cloud /: leverage powerful Red Hat Enterprise Virtualization solutions to build your own IaaS cloud. (2014) Authors: Subramanian, Pradeep Record Type: Book Extent: 1 online resource (178 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗