Back to Results
First PageMeta Content



Introduction Architecture et ´ elaboration d’un rootkit Exemple de construction d’un rootkit “furtif” Conclusion
Add to Reading List

Document Date: 2016-07-01 12:08:46


Open Document

File Size: 707,81 KB

Share Result on Facebook