

Paperback: 488 pages
Publisher: No Starch Press; 2nd edition (February 4, 2008)
Language: English
ISBN-10: 1593271441
ISBN-13: 978-1593271442
Product Dimensions: 7 x 1.2 x 9.2 inches
Shipping Weight: 1.9 pounds (View shipping rates and policies)
Average Customer Review: 4.4 out of 5 stars See all reviews (196 customer reviews)
Best Sellers Rank: #4,371 in Books (See Top 100 in Books) #2 in Books > Computers & Technology > Security & Encryption > Cryptography #2 in Books > Computers & Technology > Security & Encryption > Encryption #6 in Books > Computers & Technology > Internet & Social Media > Hacking

ContentsThis is the second edition of a well known book about hacking and contains a lot about hacking. Jon Erickson has expanded the book from the first edition doubling the number of pages to 450 pages and a Linux based Live-CD is also included.I don't own the first edition, since I had to choose between Hacking by Jon Erickson and The Shellcoders Handbook (first edition, it is also in 2nd ed. now). I choose the Shellcoders handbook, which I have considered my bible for buffer overflows and hacking.Now that I have read Jon Ericksons book about hacking I have two bibles, both excellent and well written, both covering some of the same stuff - but in very different ways.This book details the steps done to perform buffer overflows on Linux on the x86 architecture. So detailed that any computer science student can do it, and they should. Every computer science student or aspiring programmer should be forced to read this book along with another book called 19 deadly sins of software programming.That alone would improve internet security and program reliability in the future. Why you may ask, because this book teaches hacking, and how you can get started hacking.Not hacking as doing criminal computer break ins, but thinking like an old-school hacker - doing clever stuff, seeing the things others don't. This book contains the missing link back to the old days, where hackers were not necessarily bad guys. Unfortunately today the term hacker IS dead in the public eye, it HAS been maimed, mutilated and the war about changing it back to the old meaning is over. (Actually this war was fought in the 1990's but some youngsters new to hacking still think it can be won, don't waste your time.
This is the last in a recent collection of reviews on "hacking" books. Jon Erickson's Hacking, 2nd Ed (H2E) is one of the most remarkable books in the group I just read. H2E is in some senses amazing because the author takes the reader on a journey through programming, exploitation, shellcode, and so forth, yet helps the reader climb each mountain. While the material is sufficiently technical to scare some readers away, those that remain will definitely learn more about the craft.H2E accomplishes a very difficult task. The book strives to take readers with little to no real "hacking" knowledge to a level where they can at least understand, if not perform, fairly complicated digital security tasks. Other books aren't as successful, e.g., "Gray Hat Hacking," which features material on C, assembly, Python, etc. into one short chapter. In contrast, H2E, in my opinion, does a credible job leading the reader from pseudo-code to C and assembly. Now, I would not recommend this book as a reader's sole introduction to programming, let alone C or assembly. Please see my older reviews for recommendations on books devoted to those topics. Still, H2E credibly integrates programming into the hacker narrative in a compelling and educational manner.The author also has a great eye for consistency and style. I welcomed reading his examples using gdb, where he presented code, explained it, stepped through execution, showed memory, transitioned from displaying source, then assembly, and so on. This was a compelling teaching method that technical authors should try to emulate.Overall I really liked H2E, hence the 5 star review. My only main gripe was the author seems to believe that it's in society's benefit for black hats to test and exploit defenses.
Hacking: Computer Hacking:The Essential Hacking Guide for Beginners, Everything You need to know about Hacking, Computer Hacking, and Security ... Bugs, Security Breach, how to hack) Hacking: The Art of Exploitation, 2nd Edition Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy C++: C++ and Hacking for dummies. A smart way to learn C plus plus and beginners guide to computer hacking (C Programming, HTML, Javascript, Programming, Coding, CSS, Java, PHP) (Volume 10) C++: A Smart Way to Learn C++ Programming and Javascript (c plus plus, C++ for beginners, JAVA, programming computer, hacking, hacking exposed) (C ... Coding, CSS, Java, PHP) (Volume 1) Hacking: Ultimate Hacking for Beginners, How to Hack Hacking: Ultimate Beginner's Guide to Computer Hacking in 2016 Language Hacking Spanish (Language Hacking with Benny Lewis) Hacking: The Ultimate Beginners Guide to the World of Hacking From South Texas to the Nation: The Exploitation of Mexican Labor in the Twentieth Century (The David J. Weber Series in the New Borderlands History) Plunder and Deceit: Big Government's Exploitation of Young People and the Future Ecology of an African Rain Forest: Logging in Kibale and the Conflict Between Conservation and Exploitation The Poverty Industry: The Exploitation of America's Most Vulnerable Citizens (Families, Law, and Society) How the Other Half Banks: Exclusion, Exploitation, and the Threat to Democracy Social Engineering: The Art of Human Hacking Handmade Electronic Music: The Art of Hardware Hacking Hacking Kickstarter, Indiegogo: How to Raise Big Bucks in 30 Days: Secrets to Running a Successful Crowdfunding Campaign on a Budget (2015 Edition) Naturally Triple Your Testosterone: A Guide to Hacking Your Hormones and Becoming Superhuman Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage