Showing 281 - 300 results of 867 for search '((((hone OR ((phonge OR zhonge) OR pone)) OR phong) OR (ghonge OR ghoonge)) OR (hon OR soon))'s', query time: 0.19s Refine Results
  1. 281

    EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs / by Yahia, Mostafa, author 656270

    Published 2023
    “…This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills. The book begins by explaining phishing and email attack types and how to detect and investigate them, along with Microsoft log types such as Security, System, PowerShell, and their events. …”
    Get full text
    Get full text
    software, multimedia
  2. 282
  3. 283
  4. 284
  5. 285

    Starting from scratch by Koh, Bernice Jia Hong, Goh Shun Jie, Tan, Benjamin, Tan, Joanne Li Ling

    Published 2016
    “…Based on research findings, the problem statement was identified, which helped hone the campaign’s strategy, tactics and goals. …”
    Get full text
    Final Year Project (FYP)
  6. 286
  7. 287
  8. 288
  9. 289
  10. 290
  11. 291
  12. 292
  13. 293
  14. 294
  15. 295
  16. 296
  17. 297
  18. 298

    PRIVATE GAMES / by James Patterson, author 619115, Sullivan, Mark, author 505729

    Published 2012
    “…Head of Private London Peter Knight, who has both a professional and personal relationship with Marshall, is called to the scene. Coming so soon after loss of friends and colleagues in a fatal plane crash, Marshall's murder is an almost intolerable blow to Knight, and it soon becomes clear that not Marshall--but the Games themselves-- are the killer's number one target.…”
    text
  19. 299
  20. 300