Malware can be detected by placing fake resources within ... [26] Spitzner, L.: Honeypots: Tracking Hackers, Addison-Wesley Longman.
確定! 回上一頁