Welcome![Sign In][Sign Up]
Location:
Search - rootkit subverting the windows kernel

Search list

[Develop ToolsRootkits[1].Subverting.the.Windows.Kernel

Description: RootKit :Subverting windows kernel
Platform: | Size: 1665984 | Author: 我同 | Hits:

[Other resourceRootKit

Description: rootkit技术,欢迎下载,英文书名:Rootkits:Subverting the Windows Kernel 计算机安全图书中第一本关于终极后门程序——Rootkit的详尽指南! 世界级软件安全专家、rootkit.com创始人Greg Hoglund教您全面掌握rootkit,提升自己的安全防范能力
Platform: | Size: 64550 | Author: 谢淼 | Hits:

[BooksRootkits[1].Subverting.the.Windows.Kernel

Description: RootKit :Subverting windows kernel -RootKit: Subverting windows kernel
Platform: | Size: 1666048 | Author: 我同 | Hits:

[OtherRootKit

Description: rootkit技术,欢迎下载,英文书名:Rootkits:Subverting the Windows Kernel 计算机安全图书中第一本关于终极后门程序——Rootkit的详尽指南! 世界级软件安全专家、rootkit.com创始人Greg Hoglund教您全面掌握rootkit,提升自己的安全防范能力-rootkit technology, welcome to download, English title: Rootkits: Subverting the Windows Kernel computer security book the first book on the ultimate backdoor- Rootkit detailed guide! World-class software security experts, rootkit.com founder Greg Hoglund teach you the full rootkit, to upgrade their security capacity
Platform: | Size: 64512 | Author: | Hits:

[VC/MFCSubvertingtheWindowKernel

Description: 全面讲解Rootkit的安全防护的书籍~ 国外经典著作~-Rootkit comprehensive security on the books ~ foreign classics ~
Platform: | Size: 1666048 | Author: 小华子 | Hits:

[OtherProfessional.Rootkits.Subverting.the.Windows.Kern

Description: How to develop a windows kernel based rootkit.
Platform: | Size: 1197056 | Author: fatuo | Hits:

[Software EngineeringSubverting.The.Windows.Kernel

Description: This book covers Windows rootkits, although most of the concepts apply to other operating systems as well, such as LINUX. We focus on kernel rootkits because these are the most difficult to detect. Many public rootkits for Windows are userland rootkit because these are the easiest to implement, since they do not involve the added complexity of understanding how the undocumented kernel works.-This book covers Windows rootkits, although most of the concepts apply to other operating systems as well, such as LINUX. We focus on kernel rootkits because these are the most difficult to detect. Many public rootkits for Windows are userland rootkit because these are the easiest to implement, since they do not involve the added complexity of understanding how the undocumented kernel works.
Platform: | Size: 1666048 | Author: sukumi | Hits:

CodeBus www.codebus.net