7 1/2 X 9 1/4 in Introduction
Part I: A Journey to Kernel Land
Cha pter 1: From User Land to Kernel Land Attacks
Chapter 2: A Tax onomy of Kernel Vulnerabilities
Chapter 3: Stairway to Success ful Kernel Exploitation
Part II: The Unix Family, Mac OS X, an d Windows
Chapter 4: The Unix Family
Chapter 5: Mac OS X
Chapter 6: Windows
Part III: Remote Kernel Expl oitation
Chapter 7: Facing the Challenges of Remote Exploitati on
Chapter 8: Putting it all Together: A Linux Case Study
< br>Part IV: Final Words
Chapter 9: Kernel Evolution: Future Attacks and Defense