Poetry Madness
 
 

Recently Viewed clear list


Q&A | February 27, 2014

Rene Denfeld: IMG Powell’s Q&A: Rene Denfeld



Describe your latest book. The Enchanted is a story narrated by a man on death row. The novel was inspired by my work as a death penalty... Continue »
  1. $18.19 Sale Hardcover add to wish list

    The Enchanted

    Rene Denfeld 9780062285508

spacer
Qualifying orders ship free.
$49.95
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
Qty Store Section
1 Burnside - Bldg. 2 Internet- Hackers
25 Local Warehouse Networking- Computer Security
25 Remote Warehouse Networking- Computer Security

Hacking: The Art of Exploitation

by

Hacking: The Art of Exploitation Cover

 

Synopses & Reviews

Publisher Comments:

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:

  • Program computers using C, assembly language, and shell scripts
  • Corrupt system memory to run arbitrary code using buffer overflows and format strings
  • Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
  • Outsmart common security measures like nonexecutable stacks and intrusion detection systems
  • Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence
  • Redirect network traffic, conceal open ports, and hijack TCP connections
  • Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix

Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

Book News Annotation:

Erickson is a computer security specialist who has been programming and hacking computers since he was five years old. In Hacking, the author demonstrates how the art of computer hacking can be used in a positive way, such as exposing weaknesses in security applications or solving difficult programming issues. Erickson even explains how the most arcane hacking methods can still be used to crack computer code in this volume, which is aimed at programmers, software engineers and computer science students. A CD-ROM is included to provide a Linux programming and debugging environment. Annotation ©2008 Book News, Inc., Portland, OR (booknews.com)

Synopsis:

In this second edition, author Erickson uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking, and cryptography. Readers can easily follow along with example code by booting the included live CD.

Synopsis:

The Metasploit Framework is a powerful suite of tools that security researchers use to investigate and resolve potential network and system vulnerabilities. Metasploit: The Penetration Tester's Guide shows readers how to assess networks by using Metasploit to launch simulated attacks that expose weaknesses in their security. The book begins with the basics of information security and Metasploit, then proceeds to general and advanced techniques for penetration testing, including network reconnaissance and enumeration, server- and client-side attacks, devastating wireless attacks, and even targeted social engineering attacks. Whether readers are looking to secure their own networks or discover holes in others', Metasploit is the definitive guide to penetration testing with this dynamic and flexible framework.

Synopsis:

This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers — those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.

Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.

About the Author

Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.

Table of Contents

HACKING: THE ART OF EXPLOITATION, 2ND EDITION.ACKNOWLEDGMENTSPREFACEChapter 0x100: INTRODUCTIONChapter 0x200: PROGRAMMINGChapter 0x300: EXPLOITATIONChapter 0x400: NETWORKINGChapter 0x500: SHELLCODEChapter 0x600: COUNTERMEASURESChapter 0x700: CRYPTOLOGYChapter 0x800: CONCLUSIONCOLOPHON

Product Details

ISBN:
9781593271442
Subtitle:
The Art of Exploitation
Author:
Erickson, Jon
Author:
O'Gorman, Jim
Author:
Kennedy, David
Author:
rickson
Author:
Levy, Steven
Author:
Kearns, Devon
Author:
Jon E.
Author:
n Erickson
Author:
Aharoni, Mati
Author:
Jo
Publisher:
No Starch Press
Subject:
Security - General
Subject:
Computer networks
Subject:
Computer security
Subject:
Computer networks -- Security measures.
Subject:
Programming - General
Subject:
Security
Subject:
Internet - Security
Subject:
Networking-Computer Security
Subject:
Hacking;computer security;cryptography;exploits;networking;programming;security
Copyright:
Edition Number:
2
Edition Description:
Trade Paper
Series Volume:
Heroes of the Comput
Publication Date:
20080204
Binding:
Paperback
Language:
English
Illustrations:
Y
Pages:
480
Dimensions:
8.50 x 5.50 in

Other books you might like

  1. The Unofficial Guide to Ethical...
    Used Trade Paper $19.95
  2. The Hacker Ethic and the Spirit of... Used Hardcover $3.95
  3. Silence on the Wire Used Trade Paper $14.95
  4. The Online Identity Theft Prevention...
    New Trade Paper $23.95
  5. Wi-Foo: The Secrets of Wireless Hacking Used Trade Paper $14.95
  6. Mobile and Wireless Design Essentials New Trade Paper $40.50

Related Subjects

Computers and Internet » Internet » General
Computers and Internet » Internet » Hackers
Computers and Internet » Networking » Computer Security
Computers and Internet » Software Engineering » Programming and Languages

Hacking: The Art of Exploitation New Trade Paper
0 stars - 0 reviews
$49.95 In Stock
Product details 480 pages No Starch Press - English 9781593271442 Reviews:
"Synopsis" by ,
In this second edition, author Erickson uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking, and cryptography. Readers can easily follow along with example code by booting the included live CD.
"Synopsis" by ,

The Metasploit Framework is a powerful suite of tools that security researchers use to investigate and resolve potential network and system vulnerabilities. Metasploit: The Penetration Tester's Guide shows readers how to assess networks by using Metasploit to launch simulated attacks that expose weaknesses in their security. The book begins with the basics of information security and Metasploit, then proceeds to general and advanced techniques for penetration testing, including network reconnaissance and enumeration, server- and client-side attacks, devastating wireless attacks, and even targeted social engineering attacks. Whether readers are looking to secure their own networks or discover holes in others', Metasploit is the definitive guide to penetration testing with this dynamic and flexible framework.

"Synopsis" by ,

This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers — those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.

Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.

spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.