Télécharger le livre :  Detecting Peripheral-based Attacks on the Host Memory
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses...

Editeur : Springer
Parution : 2014-12-27
Collection : T-Labs Series in Telecommunication Services ePub

94,94

Téléchargement immédiat
Dès validation de votre commande