Very nice tut.Where did you get your resources to write this? Do you recommend any other good reads on the same subject...like Malware Forensics,Malware Analysis....things along those lines?