Dissecting Operation Troy: Cyberespionage in South Korea

Document -

Dissecting Operation Troy: Cyberespionage in South Korea

  • Licentie: Media Use
    The content may be downloaded by journalists, bloggers, columnists, creators of public opinion, etc. It can be used and shared in different media channels to convey, narrate, and comment on your press releases, posts, or information, provided that the content is unmodified. The author or creator shall be attributed to the extent and in the manner required by good practice (this means, for example, that photographers should be attributed).
  • Bestandsformaat: .pdf
Download

Onderwerpen

  • Computerbeveiliging

Tags

  • advanced evastion techniques
  • aet
  • beveiliging
  • computer beveiliging
  • firewall
  • malware
  • mcafee
  • next generation firewall
  • ngfw
  • security

Gerelateerde verhalen