Culmination 发表于 2025-3-23 12:25:29

http://reply.papertrans.cn/99/9836/983548/983548_11.png

Exposure 发表于 2025-3-23 17:38:48

http://reply.papertrans.cn/99/9836/983548/983548_12.png

Lime石灰 发表于 2025-3-23 21:28:24

http://reply.papertrans.cn/99/9836/983548/983548_13.png

地牢 发表于 2025-3-24 00:43:01

http://reply.papertrans.cn/99/9836/983548/983548_14.png

THROB 发表于 2025-3-24 05:18:53

http://reply.papertrans.cn/99/9836/983548/983548_15.png

Engaging 发表于 2025-3-24 10:06:47

Hardware Trojans in Electronic Devices,nd keyboards). Detailed overview of the main software and hardware solutions for the protection of phone conversations from malicious actions and interception of information is provided. The chapter also includes the first-ever examination of actual and potential hazards of a new type—car viruses.

Offensive 发表于 2025-3-24 14:01:39

http://reply.papertrans.cn/99/9836/983548/983548_17.png

过于平凡 发表于 2025-3-24 14:55:33

http://reply.papertrans.cn/99/9836/983548/983548_18.png

commute 发表于 2025-3-24 21:00:42

http://reply.papertrans.cn/99/9836/983548/983548_19.png

Filibuster 发表于 2025-3-25 01:44:02

Computer Viruses, Malicious Logic, and Spyware,introduction, and their interaction with the attacker are considered. Software keylogger, the basic principles of rootkit technologies, cookies spyware, and Regin spyware are studied in detail. Various examples are given to illustrate ways of Trojan software introduction in a standard PE file of the
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Viruses, Hardware and Software Trojans; Attacks and Counterm Anatoly Belous,Vitali Saladukha Book 2020 Springer Nature Switzerland AG 2020