
Table of Contents
| Index











Chapter 1.
Leave No Trace










Chapter 2.
Subverting the Kernel












Chapter 3.
The Hardware Connection










Chapter 4.
The Age-Old Art of Hooking





Chapter 5.
Runtime Patching





Chapter 6.
Layered Drivers





Chapter 7.
Direct Kernel Object Manipulation







Chapter 8.
Hardware Manipulation







Chapter 9.
Covert Channels








Chapter 10.
Rootkit Detection



