pt. I A JOURNEY TO KERNEL LAND ch. 1 From User-Land to Kernel-Land Attacks Introduction Introducing the Kernel and the World of Kernel Exploitation Why Doesn't My User-Land Exploit Work Anymore? An Exploit Writer's View of the Kernel User-Land Processes and the Scheduler Open Source versus Closed Source Operating Systems ch. 2 A Taxonomy of Kernel Vulnerabilities Uninitializ…