(Table of contents
1. Literacy chapter of the in-depth analysis of Trojan horse killing ………………………………………………………… (1)
2. The process of the in-depth analysis of Trojan horse detection and killing (1)……………………………………………… (3)
3. The process of the in-depth analysis of Trojan horse detection and killing (2)……………………………………………… (7)
4. The process of in-depth analysis of Trojan horse detection and killing (3)……………………………………………… (12)
5. The process of in-depth analysis of Trojan horse detection and killing (4)……………………………………………… (18)
6. The self-starting item of the in-depth analysis of Trojan horse detection and killing (1) ………………………………………… (24)
7. The self-starting item of the deep training and analysis of Trojan horse killing (2)………………………………………… (30)
8. Trojan Horse Removal - Self-starting Items of Trojan Horse Detection and Analysis (3) …………………………………… (35)
9. Trojan Horse Removal - Self-starting Items of Trojan Horse Detection and Analysis (4) …………………………………… (41)
10. Trojan Horse Removal - In-depth Analysis of Trojan Horse Killing (1) ………………………………………… (46)
11. Trojan horse solution - Trojan horse killing in-depth analysis of the document (2) ………………………………………… (52)
12. Trojan horse solution - Trojan horse killing in-depth analysis of the document (3) ………………………………………… (61))