((HD PDF original version) [Introduction] This book is now the first detailed guide for rootkits, including the concept of rootkits, how they work, how to build and view them. Greg Hoglund and James Butler, the world's top software security experts and rootkit founders, will introduce to you how the attacker enters the system and resides for a long time without being seen, and how the hacker destroys the WindowsXP and Windows2000 kernel systems. The concept can be used on any modern mainstream operating system. Through this book, readers can master any rootkit and improve their computer security. [Introduction to the Translator] This book provides an introduction to the translator, Greg Hoglund, a pioneer in the field of software security. CEO of HBGary Enterprises, a leading provider of software security verification services. After writing one of the first web vulnerability scanners (installed in more than half of the Fortune 500 companies), creating and documenting the first WindowsNT based rootkit, together building the rootkit.corn website. Frequent speaker at BlackHat, RSA and other security conferences. Co-authored the best-selling book "Software Analysis - Code Attack and Defense" (introduced and published by Renxue Publishing House, ISBN: 7-302-10445-X).)