Rootkits

From CyberSecurity
Revision as of 22:49, 19 November 2005 by Jalsalam (talk | contribs)

Jump to: navigation, search

Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.


Paper Sections/Works in Progress, etc

Section 1 Section 2 Section 3 Section 4 - Responses Section 5

See the discussion Tab where I accidentally posted most everything -Jameel