Covers the theoretical techniques and approaches needed to develop reliable and effective kernellevel exploits and applies them to different operating systems Linux Solaris Mac OS X and Windows. This title discusses the most popular OS families UNIX derivatives Mac OS X and Windows and how to gain complete control over them.