Hacking: the Art of Exploitation
Hacking: the Art of Exploitation

Author: Jon Erickson
Publisher: No Starch Press, 2008
Pages: 488
ISBN: 978-1593271442
Aimed at: Hackers
Rating: 3
Pros: Some practical advice on using programming flaws and hence how to avoid them
Cons: A lot of irrelevant material included
Reviewed by: Harry Fairhead


Books on hacking all seem to suffer from a common fault and this one is no exception. The fault in question is trying to cater for the complete beginner while dealing with material that is far too difficult.

Author: Jon Erickson
Publisher: No Starch Press, 2008
Pages: 488
ISBN: 978-1593271442
Aimed at: Hackers
Rating: 3
Pros: Some practical advice on using programming flaws and hence how to avoid them
Cons: A lot of irrelevant material included
Reviewed by: Harry Fairhead

Books on hacking all seem to suffer from a common fault and this one is no exception. The fault in question is trying to cater for the complete beginner while dealing with material that is far too difficult for the self same beginner. The reason for this fault seems to be the desire to latch onto the enthusiasm, or supposed enthusiasm, for hacking that the young, innocent and impressionable might have.

This is silly and misguided as hacking is a serious business that takes a lot of top grade knowledge before you can even begin. Rather than trying to explain the basic concepts of programming this book would be better off assuming them and telling any reader who hasn't got them to come back later.

If you are interested in hacking techniques that go beyond the social engineering approach of tricking people into revealing their passwords or using trojans then this might well be a book for you. However it's heavily into Intel architecture assembler, Linux and, in particular, the C programming language.

The book starts off with a discussion of how to exploit overflow bugs. If you can make an application overflow its stack then you can get it to run a program of your design. Similarly, but more difficult, are heap overflows and C-style format string errors. This is the most interesting part of the book, but once you have even the vaguest hint of the idea it's obvious what you have to do and how you could elaborate it to make it better. If these ideas are new then you will find yourself constantly saying "of course".

From this point the book is all down hill. We have chapters dealing with network hacking, cryptography and wireless network hacks. Much of this part of the book is very well-known and available information. There is also a good deal of unnecessary theoretical speculation on quantum cryptography. This, and the over-long listings of outputs, gives the impression that padding was necessary to reach the final size of this book. If the extraneous material were cut and the ideas presented in a concise form you would probably have one or two magazine articles that would make good reading.

So for the few nuggets of information that it contains, this is a good book but it is it worth the price? Probably not.

Banner


Introduction to Computation and Programming Using Python

Author: John V Guttag 
Publisher: MIT Press
Pages: 296
ISBN: 9780262525008
Print: 0262525003
Kindle: B00EK6P6RM
Audience: Students wanting a thorough grounding in Computer Science 
Rating: 5
Reviewer:  Mike James

 

Python  and computation - what else could go to [ ... ]



Developing Quality Technical Information

Authors: Michelle Carey, Moira McFadden Lanyi, Deidre Longo, Eric Radinski, Shannon Rouiller, Elizabeth Wilde
Publisher: IBM Press
Pages: 624
Audience: Those who produce technical documentation
ISBN-13: 9780133118971
Print: 0133118975
Kindle: B00L7ZKJ26
Rating: 3.5
Reviewer: Kay Ewbank

 

  [ ... ]


More Reviews

Last Updated ( Tuesday, 09 March 2010 )
 
 

   
Banner
RSS feed of book reviews only
I Programmer Book Reviews
RSS feed of all content
I Programmer Book Reviews
Copyright © 2017 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.