2008年(1655)
分类: LINUX
2008-05-28 13:03:21
Providing step-by-step instructions and examples required to produce full-featured, robust rootkits, this book walks you through all of the capabilities of rootkits, the technology they use, and the detection methods to impede their distribution.