Hacking: The Art of Exploitation, 2nd Edition

Hacking: The Art of Exploitation, 2nd Edition

by Jon Erickson

Paperback(Second Edition)

$44.96 $49.95 Save 10% Current price is $44.96, Original price is $49.95. You Save 10%.
View All Available Formats & Editions
Choose Expedited Shipping at checkout for guaranteed delivery by Monday, January 21

Product Details

ISBN-13: 9781593271442
Publisher: No Starch Press
Publication date: 02/28/2008
Edition description: Second Edition
Pages: 488
Sales rank: 117,916
Product dimensions: 7.00(w) x 9.25(h) x 1.17(d)

About the Author

Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He works as a cryptologist and security specialist in Northern California.

Table of Contents

Chapter 0x100: Introduction
Chapter 0x200: Programming
Chapter 0x300: Exploitation
Chapter 0x400: Networking
Chapter 0x500: Shellcode
Chapter 0x600: Countermeasures
Chapter 0x700: Cryptography
Chapter 0x800: Conclusion

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews

Hacking: The Art of Exploitation, 2nd Edition 4.2 out of 5 based on 0 ratings. 14 reviews.
Guest More than 1 year ago
Are you a true hacker in the name of the word? If you are, then this book is for you. Author Jon Erickson, has done an outstanding job of writing a second edition of a book that shows you the true spirit of hacking. Erickson, begins with an explanation of how programs can be exploited. Then, the author discusses the less obvious errors that have given birth to more complex exploit techniques that can be applied in many different places. Next, he shows you how to network your applications by using sockets and how to deal with common network vulnerabilities. The author also discusses how writing shellcode develops assembly language skills and employs a number of hacking techniques worth knowing. He continues by showing you why defensive countermeasures can be separated into two groups: Those that try to detect the attack and those that try to protect the vulnerability. Finally, the author discusses why cryptology is relevant to hacking in a number of ways. This most excellent book has explained some of the basic techniques of hacking. But, more importantly, the book looked at various hacker techniques, from the past to the present, and dissected them to learn how and why they work.
Anonymous More than 1 year ago
Chode chode chode chode chode chode...and more chode
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Guest More than 1 year ago
Great work. The book is worth the value in coding lessons.
Anonymous More than 1 year ago
A great read especially for C programmers
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
LJ794 More than 1 year ago
This has a lot of interesting material from past, present and future. It gives the guidelines needed to exploit different systems from different angles and sources. It has a diverse knowledge base of every type of exploitation that is available for your own use to gain access, help protect or even secure your own system. I would recommend to anyone interested in protecting yourself from hackers.
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago