How Not to Be Seen II The Defenders Fight Back.

For pt.I see ibid., vol. 5, no.1, p.67-69 (2007). This article discusses about stealthy software-that is, software that manipulates a computer in some way to avoid some aspect of its operation. The stealth is divided up into roughly three categories: passive, hooking, and hypervisor-based stealth de...

সম্পূর্ণ বিবরণ

গ্রন্থ-পঞ্জীর বিবরন
প্রকাশিত:IEEE Security and privacy : building confidence in a networked world 5, 6 (2007).
প্রধান লেখক: Allen, W.H
বিন্যাস: প্রবন্ধ
ভাষা:English
বিষয়গুলি: