This article expatiates all kinds of cyber-crime methods,and analyses some cyber log obtained technologies, integrality safeguard technology and cyber log analysing technology in all kinds of surroundings.

 
  • 阐述了当前计算机犯罪的各种手段和各种环境下的计算机日志获取技术,完整性保护技术和分析方法进行了列举和分析。
今日热词
目录 附录 查词历史