![]() The author also presents very useful countermeasures - those that detect exploits and those that deflect them.Ĭhapter 1, Introduction, sets the expectations for the rest of the book. In its eight chapters, it lays a groundwork for understanding the basic methods of hacking (identifying and exploiting weaknesses in deployed code) and follows through with details on how specific flaws lead to specific attacks. The book consistently provides clear, yet detailed, explanations. It is probably the best book to read if you want a thorough understanding of various hacking techniques, especially if you know enough about programming to put some of what you learn into practice - not for hacking, I would hope, but to use the same skills for vulnerability testing and the same knowledge for protecting your network. Hacking: The Art of Exploitation, 2nd Edition (Jon Erickson, No Starch Press, 2008) is an intense, thorough and extremely well written book that can take you from basic hacking concepts to building your own security code in a surprisingly short time.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |