2. A guide to kernel exploitation : attacking the core

Author:

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: Security measures ، Operating systems )Computers(,، Computer security

Classification :
QA
76
.
76
.
O63
P5168
2011