Imagine being able to change the languages for the applications that a computer is running & taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This title shows the reader how these rootkits are developed & how this attack can change the managed code that a computer is running.