Rootkits

From CyberSecurity
Revision as of 22:50, 19 November 2005 by Jalsalam (talk | contribs)

Jump to: navigation, search

Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.


Paper Sections/Works in Progress, etc

  • Section 1
  • Section 2
  • Section 3
  • Section 4 - Responses
  • Section 5

See the discussion Tab where I accidentally posted most everything -Jameel