Home | Best Seller | FAQ | Contact Us
Browse
Art & Photography
Biographies & Autobiography
Body,Mind & Health
Business & Economics
Children's Book
Computers & Internet
Cooking
Crafts,Hobbies & Gardening
Entertainment
Family & Parenting
History
Horror
Literature & Fiction
Mystery & Detective
Nonfiction
Professional & Technology
Reference
Religion
Romance
Science
Science Fiction & Fantasy
Sports & Outdoors
Travel & Geography
   Book Info

enlarge picture

Hacking: The Art of Exploitation  
Author:
ISBN: 1593270070
Format: Handover
Publish Date: June, 2005
 
     
     
   Book Review

From Book News, Inc.
Erickson, a cryptologist and security specialist, introduces the spirit and theory of computer hacking as well as the science, allowing readers to understand the hacker mindset and thwart potential attacks. He explains how to exploit programs using buffer overflows and format strings, write printable ASCII polymorphic shellcode, defeat non- executable stacks by returning to libc, and crack encrypted 8-2.11b wireless traffic using the FMS attack.Copyright © 2004 Book News, Inc., Portland, OR

About.com, November 2003
"This is an excellent book."

Security Forums, January 2004
"the seminal hackers handbook"

Geekshelter.com, January 2004
"This would make a great addition to any computer enthusiast's book shelf."

IEEE Cipher, March 15, 2004
"I highly recommend this book."

IEEE Security & Privacy, March 2004
"Erickson presents the material in a manner that is both easy to follow and a joy to read."

UnixReview.com, June 2004
"every Linux/Unix administrator and applications programmer can learn something from the programming section"

Database-Book-Reviews.com http://www.database-book-reviews.com/book_reviews/by_publisher/No_Starch/
5 stars, "One of a kind… Superb, Thrilling , Excellent Book."

Book Description
Emphasizing a true understanding of the techniques as opposed to just breaking the rules, the author helps readers determine which areas are prone to attack and why. Unlike other so-called hacking guides, this book does not gloss over technical details, and includes detailed sections on stack-based overflows, heap based overflows, format string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

About the Author
JON ERICKSON has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.




Hacking: The Art of Exploitation

FROM OUR EDITORS

The Barnes & Noble Review
What is the true spirit of hacking? It￯﾿ᄑs exploration. Discovery. Invention. If you want to be a pioneer, not just a ￯﾿ᄑscript kiddie,￯﾿ᄑ read Hacking: The Art of Exploitation.

This book is about awakening and feeding your passionate curiosity about how software and networks work. What do overflows look like, and how do they make systems vulnerable? What can be done with shellcode? How do Denial of Service and TCP/IP Hijack attacks work? How does a man-in-the-middle attack circumvent encryption?

Whether you￯﾿ᄑre exploiting systems, protecting them, or just plain fascinated by them, this is the technical foundation you need to start hacking -- for real. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks for Dummies, Second Edition.

FROM THE PUBLISHER

ABOUT THE AUTHOR

Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist for Luminare Consulting.


ABOUT NO STARCH PRESS

Since 1994, No Starch Press has published unique books on computing, with a focus on Open Source, security, hacking, web development, programming, gaming, and alternative operating systems. Our titles have personality, our authors are passionate, and our goal is to make computing accessible to everyone.

SYNOPSIS

This technical, code-filled book about the art of creative problem solving known as hacking dissects various hacker techniques, both old and new, to see what makes them work. Unlike many hype-filled hacking books which explain how to download and use someone else's exploit, Erickson goes in-depth into each exploit to explain what happens at the code level, and the underlying logic. As the reader learns about each exploit technique they learn not only about that particular security flaw but also why most systems are vulnerable and most software is insecure.

Some of the techniques covered in the book are:
Exploiting programs using buffer overflows and format strings Writing printable ASCII polymorphic shellcode Defeating non-executable stacks by returning into libc Redirecting network traffic, concealing open ports, and hijacking TCP connections Cracking encrypted 802.11b wireless traffic using the FMS attack

This is a book for the true hacker, whether that means the black clad system invader we see in the movies (thanks, Keanu), the underappreciated sys admin keeping miscreants off his network, or just the neutral computer technology enthusiast who enjoys the challenge. Hacking: The Art of Exploitation teaches the reader to think like the hacker writing the exploits so that he can learn to think for himself. And that is the essence of hacking.

     



Home | Private Policy | Contact Us
@copyright 2001-2005 ReadingBee.com