DLL
Tavsifi
Kernel32.dll
Ushbu DLL fayl keng tarqalgan boʻlib asosan oʻzak funksiyalardan tashkil
topgan, masalan, xotirani, fayllarni va qurilmani boshqarish va unga
egalik qilish
(http://www.geoffchappell.com/studies/windows/win32/kernel32/api/)
Advapi32.dll
Ushbu DLL fayl WINDOWS OT ning kengaytirilgan imkoniyatlarini
boshqarishda, masalan, xizmatlarni va registorlarni boshqarishda
foydalaniladi
(http://www.geoffchappell.com/studies/windows/win32/advapi32/api/etw/
index.htm?tx=14).
User32.dll
Ushbu DLL fayl foydalanuvchi interfeysini tashkil etuvchilarni,
masalan, tugmalar, skrol barslar, foydalanuvchi harakatlariga javob
beruvchi vazifalarni bajaruvchi funksiyalardan iborat.
Gdi32.dll
Ushbu DLL fayl grafik holatni namoyish etish va boshqarish
uchun kerakli boʻlgan funksiyalardan iborat.
Ntdll.dll
Ushbu DLL fayl WINDOWS OT oʻzagining foydalanuvchi
rejimidagi koʻrinishini ifodalovchi funksiyalardan iborat. Ushbu
vazifalarni odatda Kernel32.dll va Advapi32.dll kutubxonasini
chaqirish orqali bajaradi, masalan, jarayonlarni boshqarish, vazifalarni
yashirish va hak.
WSock32.dll va
Ws2_32.dll
Ushbu DLL fayllar tarmoqqa tegishli boʻlib, tarmoqqa tegishli boʻlgan
vazifalarni bajararidigan funksiyalardan iborat.
Wininet.dll
Ushbu
DLL
fayl
tarmoqning
yuqori
vazifalarini
bajaruvchi
funksiyalardan iborat boʻlib, tarmoq protokollari, FTP, HTTP, va NTP
larni nazoratlaydi.
243
10.
International Journal of Cybersecurity and Digital Forensics
(http://sdiwc.net/security-journal/);
11.
International Journal of Advanced Computer Science and Information Technology
(http://elvedit.com/journals/IJACSIT/);
12.
International Journal of Information Security
(http://www.springer.com/computer/security+and+cryptology/journal/10207);
13.
International Journal of Computer Networks and Security Cryptologia
(http://recentscience.org/ijcns-international-journal-of-computer-networks-and-
security/);
14.
JISSec-Information Systems Security (http://www.jissec.org/);
15.
International Journal of Network Security (http://ijns.femto.com.tw/);
16.
ACM Transactions on Embedded Computing Systems (http://acmtecs.acm.org/);
17.
The ISSA (Information Systems Security Association) Journal
(http://www.issa.org/?page=ISSAJournal);
18.
ISJ-GP-Information Security Journal: A Global Perspective
(http://www.tandfonline.com/action/aboutThisJournal?journalCode=uiss20#.Uwyyz
LmPJaQ);
19.
TWEB-ACM Transactions on The Web (http://tweb.acm.org/index.html);
20.
Journal of Information Assurance & Cybersecurity
(http://www.ibimapublishing.com/journals/JIACS/jiacs.html);
21.
Journal of Information Security and Applications (JISA)
(http://www.journals.elsevier.com/journal-of-information-security-and-
applications/);
22.
Cybersecurity & Information Systems Information Analysis Center
(https://www.thecsiac.com/journal/welcome-csiac);
23.
Journal of Cyber Security and Mobility by River Publishers
(http://riverpublishers.com/journal.php?j=JCSM/2/3);
24.
JCS-Journal of Computer Security (http://www.iospress.nl/journal/journal-of-
computer-security/);
25.
IMCS-Information Management & Computer Security
(http://www.emeraldinsight.com/products/journals/journals.htm?id=imcs).
244
Do'stlaringiz bilan baham: |