BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploitation
DeltaV and Virtualization