最后在此基础上提出一个具体的实现方案并予以实现。
Last presents a specific implementation based on the resource and realize this method.
最后在此基础上完成了一个基于内核入侵的木马设计与实现。
Based on that, has completed the design and the realization of a kind of kernel hacking Trojan Horse Finally.
最后在此基础上,有针对性地提出了企业走高科技上市之路的对策建议。
Finally, on this basis this article advances some countermeasure and Suggestions for enterprise's listing in the form of high-tech.
应用推荐