Addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. This book describes the underground world of UNIX hacking & reveals methods & techniques used by hackers, malware coders, & anti-forensic developers.