Login       My Wishlist
  My Cart
$0.00 / 0 items
Dream Africa H
Discover The Amazing Land Of Africa
International Access
Global Shipping Options Available
  Our Catalog   Computers & Technology   Networking & Cloud Computing

Hacking: The Art of Exploitation, 2nd Edition

Super Savings Item! Save 36% on the Hacking: The Art of Exploitation, 2nd Edition by imusti at Dream Africa H. MPN: 21316409. Hurry! Limited time offer. Offer valid only while supplies last. Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in

Product Description

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:
– Program computers using C, assembly language, and shell scripts
– Corrupt system memory to run arbitrary code using buffer overflows and format strings
– Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
– Outsmart common security measures like nonexecutable stacks and intrusion detection systems
– Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence
– Redirect network traffic, conceal open ports, and hijack TCP connections
– Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix

Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

Additional Information

Manufacturer:No Starch Press
Part Number:21316409
Publisher:No Starch Press
Studio:No Starch Press
Item Weight:2.14 pounds
Item Size:1.17 x 9.25 x 9.25 inches
Package Weight:1.9 pounds
Package Size:7.3 x 1.5 x 1.5 inches

Hacking: The Art of Exploitation, 2nd Edition by imusti

Buy Now:
Hacking: The Art of Exploitation, 2nd Edition

Brand: imusti
4.4 out of 5 stars with 21 reviews
Condition: New
Lead Time: 1 - 2 Business Days
Availability: In Stock
You Save: 36%




Have questions about this item, or would like to inquire about a custom or bulk order?

If you have any questions about this product by imusti, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.

First Name:
Last Last:
Email Address:
Your Message:

Related Best Sellers

By Brand: Apress
mpn: 978-1-59059-968-6, ean: 9781590599686, isbn: 1590599683,
This book, written by veteran Oracle database administrator Iggy Fernandez, a regular on the Oracle conference circuit and the editor of NoCOUG Journal, is a manageable introduction to key Oracle database administration topics including planning, ins...

By Morgan Kaufmann
mpn: 978-0-12-375030-3, ean: 9780123750303, isbn: 012375030X,
Early user interface (UI) practitioners were trained in cognitive psychology, from which UI design rules were based. But as the field evolves, designers enter the field from many disciplines. Practitioners today have enough experience in UI design th...

By Brand: Morgan Kaufmann
mpn: Illustrations, ean: 9781558607545, isbn: 1558607544,
Mining the Web: Discovering Knowledge from Hypertext Data is the first book devoted entirely to techniques for producing knowledge from the vast body of unstructured Web data. Building on an initial survey of infrastructural issues―including Web cr...

By Sams Publishing
ean: 9780672327049, isbn: 067232704X,
In just a few years PHP has rapidly evolved from a small niche language to a powerful web development tool. Now in use on over 14 million Web sites, PHP is more stable and extensible than ever. However, there is no documentation on how to extend PHP;...

By Cisco Press
ean: 9781587141935, isbn: 1587141930,
The definitive guide to UCS and the Cisco® Data Center Server: planning, architecture, components, deployment, and benefits With its new Unified Computing System (UCS) family of products, Cisco has introduced a fundamentally new vision for data cent...

By Apress
mpn: 1-59059-905-5, ean: 9781590599051, isbn: 1590599055,
A much-needed work focusing on one of the e-community’s hottest topics, this is the second edition of a book that covers both video and audio podcasts, as well as updated software and resources. This edition is much improved and updated to cover th...

By Cisco Press
ean: 9781587142727, isbn: 1587142724,
Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide Second Edition Foundation learning for the CCNA Security IINS 640-554 exam   Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide, Second Edition, is a Ci...

By Brand: Langaa RPCIG
mpn: black & white illustrations, ean: 9789956726899, isbn: 9956726893,
This detailed, meticulous ethnographic study on mobile phone use among Nuba students at the University of Khartoum in Sudan, distinguishes itself from other studies by taking a focused look at the linguistic content of mobile phone interactions via t...

By CreateSpace Independent Publishing Platform
mpn: black & white illustrations, ean: 9781481927307, isbn: 1481927302,
The coma patient screamed her inaudible words: Who am I? Who is this man crying over me in my bed? Answer me! Why can’t you hear me? So begins the final book in the Bound to Tradition trilogy, which continues the story of the Lindqvist family. Khir...

By CreateSpace Independent Publishing Platform
mpn: black & white illustrations, ean: 9781522723882, isbn: 1522723889,
Televisão Sonho - Rede Planetária de Televisão Cultural para a Paz Mundial é a história de um projeto, criado nos anos 1990, para uma fabulosa rede internacional de televisão dedicada à cultura e à arte, com o objetivo de promover a paz mundi...

Privacy Policy / Terms of Service
© 2018 - dreamafricah.com. All Rights Reserved.