The Fictioning Horror Sale
 
 

Recently Viewed clear list


Original Essays | September 4, 2014

Edward E. Baptist: IMG The Two Bodies of The Half Has Never Been Told: Slavery and the Making of American Capitalism



My new book, The Half Has Never Been Told: Slavery and the Making of American Capitalism, is the story of two bodies. The first body was the new... Continue »
  1. $24.50 Sale Hardcover add to wish list

spacer

This item may be
out of stock.

Click on the button below to search for this title in other formats.


Check for Availability
Add to Wishlist

Hacking: The Art of Exploitation

by

Hacking: The Art of Exploitation Cover

ISBN13: 9781593270070
ISBN10: 1593270070
All Product Details

 

Synopses & Reviews

Publisher Comments:

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Review:

"This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly." About.com

Review:

"Most complete tutorial on hacking techniques. Finally a book that does not just show how to use the exploits but how to develop them." Phrack

Review:

"While Hacking is probably a bit too technical for a casual computer user, it makes fascinating reading for those who either wish to know more or want to refine their advanced skills." The Tribune Review

Book News Annotation:

Erickson, a cryptologist and security specialist, introduces the spirit and theory of computer hacking as well as the science, allowing readers to understand the hacker mindset and thwart potential attacks. He explains how to exploit programs using buffer overflows and format strings, write printable ASCII polymorphic shellcode, defeat non- executable stacks by returning to libc, and crack encrypted 8-2.11b wireless traffic using the FMS attack.
Annotation 2004 Book News, Inc., Portland, OR (booknews.com)

Synopsis:

This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Synopsis:

Includes bibliographical references (p. 230-232) and index.

About the Author

Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.

What Our Readers Are Saying

Add a comment for a chance to win!
Average customer rating based on 1 comment:

aimsfree, April 19, 2008 (view all comments by aimsfree)
I think that Hacking is really-2x The art of Exploitation. This Title describe how Hacking is not just a set tool for crack/hack but it is more than that. Like the art... Hacking is full of hard thing...which is can make u feel tired to try it but can make happy after you succes after u try so hard :)
And Of course like the other arts.... it depend on your hand... depend on how you create "that things"
Was this comment helpful? | Yes | No
(0 of 1 readers found this comment helpful)

Product Details

ISBN:
9781593270070
Subtitle:
The Art of Exploitation
Publisher:
No Starch Press
Author:
Erickson, Jon
Location:
San Francisco, CA
Subject:
Networking - General
Subject:
Computer networks
Subject:
Computer security
Subject:
Security
Subject:
Computer hackers
Subject:
COMPUTERS / Security
Subject:
Security - General
Subject:
Computer networks -- Security measures.
Edition Description:
Print PDF
Series Volume:
03-5
Publication Date:
20041011
Binding:
Paperback
Language:
English
Illustrations:
Yes
Pages:
264
Dimensions:
9.34x7.40x.77 in. 1.16 lbs.

Related Subjects

Computers and Internet » Computers Reference » Beginning and Reference
Computers and Internet » Internet » General
Computers and Internet » Internet » Hackers
Computers and Internet » Networking » Computer Security

Hacking: The Art of Exploitation
0 stars - 0 reviews
$ In Stock
Product details 264 pages No Starch Press - English 9781593270070 Reviews:
"Review" by , "This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly."
"Review" by , "Most complete tutorial on hacking techniques. Finally a book that does not just show how to use the exploits but how to develop them."
"Review" by , "While Hacking is probably a bit too technical for a casual computer user, it makes fascinating reading for those who either wish to know more or want to refine their advanced skills."
"Synopsis" by ,
This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
"Synopsis" by , Includes bibliographical references (p. 230-232) and index.
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.