Media praise for Hacking: The Art of Exploitation

Have a blog? Join our Reader Review Program

"This book will take any programmer well beyond the usual programming techniques covered in conventional programming books."
-- William Wong, Electronic Design

"...if you’re more interested in the nuts and bolts of computer programming, hacking, exploitation, code, etc., Hacking: The Art of Exploitation is your ticket. This huge compendium of code and strategy (now in its second edition) is the most complete manual I’ve ever seen on basic programming, hacking, protocols, and the intricacies of how code works — at the machine level. Yes, from assembly to command line, Hacking has it all. It even comes with a CD of all the code in the book, as well as a stand-alone Linux OS environment, so you can follow along with the text and get your hack on."
-- Roy Christopher

"Because the programming chapter is now an introduction, I now recommend this book for the Exploitations chapter alone. This chapter covers buffer and function overflows and the format string vulnerability. Buy the book and discover why strings should be formated like this: printf("%s", text); and never like this:printf(text);"
-- Ed Schaefer, Linux Magazine

"This is an excellent book about hacking. It includes a very well written introduction to the C programming language and it contains very useful chapters on Networking and on Cryptology with lots of hands-on examples. I highly recommend it if you want to learn hacking techniques presented in a systematic way."
-- bandonghanh.10001mb.com

"While many hacking books show you how to run other people's exploits without really explaining the technical details, Hacking: The Art of Exploitation introduces you to the spirit and theory of hacking as well as the science behind it all."
-- sekarygiorg.blogspot.com

"Hacking: The Art of Exploitation, 2nd Edition was an excellent read."
-- Ryan Linn, The Ethical Hacker Network

"This is a good book. It does a great job of first establishing the mindset of a hacker and then walking the reader step by step through the various techniques of finding interesting ways to solve problems. This in itself is what the author claims is the defining characteristic of a hacker, and I agree."
-- Evan Teran, ;login: The USENIX Magazine, VOL. 33, NO. 3

"This is an excellent book about hacking."
-- Chrizna, Chrizna's Blog

"Kudos to Jon Erickson for detailing just how involved and complex of a topic network security is in a method that greatly lowers the barrier to getting started. "
-- Dave Wreski, LinuxSecurity.com



"This book will take any programmer well beyond the usual programming techniques covered in conventional programming books."
--William Wong, Electronic Design