Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors

碩士 === 大同大學 === 資訊工程學系(所) === 94 === It is important problems of the information safety at present that the computer is invaded and attacks on-linly, before damaging recovered even undiscovered ing, its damage arrow is unable to estimate in advance. And it cause the back door wide open to become and...

Full description

Bibliographic Details
Main Authors: Jia-te Wang, 汪佳德
Other Authors: Jin-cheng Lin
Format: Others
Language:en_US
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/00019713901924498438