Skip to content

Hacking: The Art of Exploitation, 2nd Edition
Stock Photo: Cover May Be Different

Hacking: The Art of Exploitation, 2nd Edition Paperback - 2008

by Erickson, Jon

  • Used
  • Paperback

In this second edition, author Erickson uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking, and cryptography. Readers can easily follow along with example code by booting the included live CD.

Drop Ship Order

Description

No Starch Press, 2008-02-04. Paperback. Used:Good.
Used:Good
NZ$62.85
FREE Shipping to USA Standard delivery: 5 to 10 days
More Shipping Options
Ships from Ergodebooks (Texas, United States)

Details

  • Title Hacking: The Art of Exploitation, 2nd Edition
  • Author Erickson, Jon
  • Binding Paperback
  • Edition 2nd
  • Condition Used:Good
  • Pages 488
  • Volumes 1
  • Language ENG
  • Publisher No Starch Press, San Francisco, CA
  • Date 2008-02-04
  • Illustrated Yes
  • Features Illustrated, Index, Recycled Paper, Table of Contents
  • Bookseller's Inventory # BKZN9781593271442
  • ISBN 9781593271442 / 1593271441
  • Weight 2.05 lbs (0.93 kg)
  • Dimensions 9.2 x 7 x 1.4 in (23.37 x 17.78 x 3.56 cm)
  • Library of Congress subjects Computer security, Computer networks - Security measures
  • Library of Congress Catalog Number 2007042910
  • Dewey Decimal Code 005.8

About Ergodebooks Texas, United States

Biblio member since 2005
Seller rating: This seller has earned a 3 of 5 Stars rating from Biblio customers.

Our goal is to provide best customer service and good condition books for the lowest possible price. We are always honest about condition of book. We list book only by ISBN # and hence exact book is guaranteed.

Terms of Sale:

We have 30 day return policy.

Browse books from Ergodebooks

From the publisher

Includes bibliographical references and index.

Media reviews

Citations

  • Scitech Book News, 06/01/2008, Page 25

About the author

Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He works as a cryptologist and security specialist in Northern California.