文件名称:Subverting.The.Windows.Kernel
介绍说明--下载内容均来自于网络,请自行研究使用
This book covers Windows rootkits, although most of the concepts apply to other operating systems as well, such as LINUX. We focus on kernel rootkits because these are the most difficult to detect. Many public rootkits for Windows are userland rootkit because these are the easiest to implement, since they do not involve the added complexity of understanding how the undocumented kernel works.-This book covers Windows rootkits, although most of the concepts apply to other operating systems as well, such as LINUX. We focus on kernel rootkits because these are the most difficult to detect. Many public rootkits for Windows are userland rootkit because these are the easiest to implement, since they do not involve the added complexity of understanding how the undocumented kernel works.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
subverting the windows kernel.chm