[MSDN Library June 1998] Interpreting the Security Log (45.6895225736188%)
MSDN Library Visual Studio 6.0 > Windows Resource Kits > Windows NT 3.51 Resource Kit > Windows NT Resource Kit Volume 5: Windows NT Update 1 > Security In a Software Development Environment
[MSDN Library June 1998] Interpreting the Security Log (42.533734864152%)
MSDN Library Visual Studio 6.0 > Windows Resource Kits > Windows NT Workstation 4.0 Resource Kit > Appendix B - Security In a Software Development Environment
[MSDN Library June 1998] Interpreting the Output (41.6930564133639%)
MSDN Library Visual Studio 6.0 > Windows Resource Kits > Windows NT Workstation 4.0 Resource Kit > Chapter 11 - Performance Monitoring Tools > Response Probe
[MSDN Library June 1998] Interpreting an Event (39.3904532967033%)
MSDN Library Visual Studio 6.0 > Windows Resource Kits > Windows NT Workstation 4.0 Resource Kit > Chapter 37 - Monitoring Events
[MSDN Library June 1998] Interpreting a Performance Results File (32.8772021629164%)
MSDN Library Visual Studio 6.0 > Windows Resource Kits > Windows NT Server 4.0 Resource Kit > Windows NT Server Resource Kit - Supplement 2 > Web Capacity Analysis Tool > Using Performance Monitor Counters in a WCAT Test
[MSDN Library September 1992] Interpreting Help 3.0 Error Messages (29.9003136200717%)
Unsupported Tools & Utilities > Windows Help Authoring Guide > Chapter 18 Help Error Messages > Help Compiler 3.0 Error Messages
[MSDN Library September 1992] Interpreting Error Messages (29.701900921659%)
Unsupported Tools & Utilities > Windows Help Authoring Guide > Chapter 18 Help Error Messages > Help Compiler 3.1 Error Messages
[MSDN Library September 1992] Interpreting the File Allocation Table (22.7051703778677%)
Books and Magazine Articles > Advanced MS-DOS Programming > PART 1 PROGRAMMING FOR MS-DOS > Chapter 10 Disk Internals
[MSDN Library September 1992] Interpreting an Object Dump (22.6915584415584%)
Product Documentation > C/C++ 7.0 > Class Libraries User's Guide > PART 2 The Microsoft Foundation Class Library Cookbook > Chapter 11 Diagnostics > 11.2 Detecting Memory Leaks