Skip to content

Hacking: the Art of Exploitation, 2nd Edition

Best in textbook rentals since 2012!

ISBN-10: 1593271441

ISBN-13: 9781593271442

Edition: 2nd 2008

Authors: Jon Erickson

List price: $49.95
Blue ribbon 30 day, 100% satisfaction guarantee!

Rental notice: supplementary materials (access codes, CDs, etc.) are not guaranteed with rental orders.

what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

While other books merely show how to run existing exploits, "Hacking: The Art of Exploitation" broke ground as the first book to explain how hacking and software exploits work and how readers could develop and implement their own. In the second edition, author Jon Erickson again uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking and cryptography. All sections have been extensively updated and expanded, including a more thorough introduction to the complex, low-level workings of a computer. Readers can easily follow along with example code by booting the included live CD, which provides a Linux programming…    
Customers also bought

Book details

List price: $49.95
Edition: 2nd
Copyright year: 2008
Publisher: No Starch Press, Incorporated
Publication date: 2/1/2008
Binding: Paperback
Pages: 488
Size: 7.01" wide x 9.21" long x 1.18" tall
Weight: 2.244
Language: English

Jon Erickson is coordinator of the Environmental Management option in the Master of Public Administration program at Kean University and former research associate at the Center for Urban Policy Research, part of the Edward J. Bloustein School of Planning and Policy Research at Rutgers University. Most recently, he helped prepare a report on "Sustainability as Partner to Economic Regeneration: The Impact Assessment of the New Jersey State Plan."

Hacking
The Art Of Exploitation, 2Nd Edition.AcknowledgmentsprefaceChapter 0X100
IntroductionChapter 0X200
ProgrammingChapter 0X300
ExploitationChapter 0X400
NetworkingChapter 0X500
ShellcodeChapter 0X600
CountermeasuresChapter 0X700
CryptologyChapter 0X800
Conclusioncolophon