2008年(3010)
分类: LINUX
2008-05-27 14:49:05
Providing step-by-step instructions and examples required to produce full-featured, robust rootkits, this book walks you through all of the capabilities of rootkits, the technology they use, and the detection methods to impede their distribution.