Goodreads helps you keep track of books you want to read.
Start by marking “The Shellcoder's Handbook: Discovering and Exploiting Security Holes” as Want to Read:
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Enlarge cover
Rate this book
Clear rating

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

3.97 of 5 stars 3.97  ·  rating details  ·  60 ratings  ·  1 review
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAf ...more
ebook, 744 pages
Published February 16th 2011 by Wiley (first published April 2nd 2004)
more details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about The Shellcoder's Handbook, please sign up.

Be the first to ask a question about The Shellcoder's Handbook

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30 of 236)
filter  |  sort: default (?)  |  rating details
عَبدُالكَرِيمْ  الهاشمي
Forget the classic stack overflows, this is definitely not a book for beginners. It covers very advanced topics including kernel exploits.
Mikk
Mikk marked it as to-read
Mar 30, 2015
Prema
Prema marked it as to-read
Mar 31, 2015
Emerson Arcella
Emerson Arcella marked it as to-read
Mar 25, 2015
Nissim
Nissim marked it as to-read
Mar 21, 2015
Barry
Barry marked it as to-read
Mar 21, 2015
Warsoly
Warsoly marked it as to-read
Mar 18, 2015
cacaegg
cacaegg marked it as to-read
Mar 14, 2015
Darren
Darren marked it as to-read
Mar 12, 2015
Josh
Josh marked it as to-read
Mar 08, 2015
Isis Binder
Isis Binder marked it as to-read
Mar 07, 2015
Mary
Mary marked it as to-read
Mar 05, 2015
Pr0fanus
Pr0fanus marked it as to-read
Mar 05, 2015
Joshua Long
Joshua Long marked it as to-read
Feb 25, 2015
Jennifer Wallace
Jennifer Wallace marked it as to-read
Feb 24, 2015
Alex Guglielmino
Alex Guglielmino marked it as to-read
Feb 22, 2015
Mike
Mike is currently reading it
Feb 16, 2015
Hassan
Hassan marked it as to-read
Feb 14, 2015
Telorian
Telorian marked it as to-read
Feb 10, 2015
Jess
Jess marked it as to-read
Feb 09, 2015
Sichu
Sichu marked it as to-read
Jan 28, 2015
Spencer
Spencer marked it as to-read
Jan 25, 2015
Computeristgeek
Computeristgeek marked it as to-read
Jan 25, 2015
Sawyer Donk
Sawyer Donk marked it as to-read
Jan 24, 2015
Mostafa Siraj
Mostafa Siraj marked it as to-read
Jan 20, 2015
Perfect Score
Perfect Score marked it as to-read
Jan 09, 2015
« previous 1 3 4 5 6 7 8 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Reversing: Secrets of Reverse Engineering
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • Metasploit: The Penetration Tester's Guide
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • The Art of Software Security Assessment: Identifying and Avoiding Software Vulnerabilities
  • A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • File System Forensic Analysis
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • Hacking: The Art of Exploitation
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  • Gray Hat Hacking: The Ethical Hacker's Handbook
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • Assembly Language: Step-By-Step
  • Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »
The Shellcoder's Handbook: Discovering and Exploiting Security Holes The Database Hacker's Handbook: Defending Database Servers

Share This Book