Keystroke programming

Results: 2



#Item
1Computer security / Data types / Control flow / Hooking / Malware / Rootkit / Keystroke logging / Computer virus / Subroutine / Computing / Software engineering / Computer programming

HookFinder: Identifying and Understanding Malware Hooking Behaviors Heng Yin†‡ Zhenkai Liang† Dawn Song§†

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
2Keystroke programming / Eqn / Reverse Polish notation / Calculator / Programmable calculators / HP 35s / Technology

JASON E. FOOSE, PS the HP 35s calculator A Field Surveyor’s Companion Part 1—Point Storage

Add to Reading List

Source URL: www.amerisurv.com

Language: English - Date: 2014-09-09 17:16:54
UPDATE