Télécharger le livre :  Detecting Peripheral-based Attacks on the Host Memory
Ajouter à ma liste d'envies
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses...

Editeur : Springer
Parution : 2014-12-27
Collection : T-Labs Series in Telecommunication Services
ePub

94,94