It might appear to be a simple question, but the audience for a book about rootkit development includes more than just rootkit developers. There are software developers interested in writing code that is not adversely affected by the possibility of rootkits. There are information technology (IT) specialists who need to understand every threat that can adversely affect their networks. There are many levels of security specialists who need to understand every possible threat posed by rootkits. There are the rootkit users who need to understand what a rootkit can do and how to use it. And let’s not forget the software engineers developing anti-rootkit technology.
Cumulatively, if you are involved in the development of interconnected software, or computer security, or just want to learn a really cool way to enhance your operating system, then this book is for you.