kaguya logoKaguya
  • Home
  • My Library
  • Browse
  • Lists
  • Members
  • Discussions
Log inSign up
kaguya logoKaguya
Sign up
Home
Browse
Library
Notifications
Notifications
Profile
About
  • Privacy
  • Terms
  • Guidelines
  • Help & Support
Contribute
  • Add Book
  • Add Covers
  • Librarian Guide
Apps
AndroidiOS

© 2025 Kaguya

Hacking: The Art of Exploitation w/CD
Rate book

Hacking: The Art of Exploitation w/CD

Jon Erickson
•

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work.

Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:

Program computers using C, ...Read More

NonfictionTechnologyScienceSelf-Help
Hacking: The Art of Exploitation w/CD
Hacking: The Art of Exploitation w/CD

Hacking: The Art of Exploitation w/CD

Jon Erickson
Published year: 2003
Pages: 505

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work.

Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:

Program computers using C, ...Read More

NonfictionTechnologyScienceSelf-Help

Reviews (0)

0 reviews

Reviews (0)

•
•
•
•
•
•
•
•
•
Popular Lists with this Book
Book cover
Book cover
Book cover
Book cover
Book cover
Must read stem books
Isaac
0 likes
10 books
Popular Lists with this Book
Book cover
Book cover
Book cover
Book cover
Book cover
Must read stem books
Isaac
0 likes
10 books

Latest discussions

No discussions yet.