Goodreads helps you keep track of books you want to read.
Start by marking “The Shellcoder's Handbook: Discovering and Exploiting Security Holes” as Want to Read:
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Enlarge cover
Rate this book
Clear rating
Open Preview

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

4.02 of 5 stars 4.02  ·  rating details  ·  65 ratings  ·  1 review
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAf ...more
ebook, 744 pages
Published February 16th 2011 by Wiley (first published April 2nd 2004)
more details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about The Shellcoder's Handbook, please sign up.

Be the first to ask a question about The Shellcoder's Handbook

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30 of 255)
filter  |  sort: default (?)  |  rating details
عَبدُالكَرِيمْ
Forget the classic stack overflows, this is definitely not a book for beginners. It covers very advanced topics including kernel exploits.
Ahmad Qubbaj
Ahmad Qubbaj marked it as to-read
May 20, 2015
Sean
Sean marked it as to-read
May 19, 2015
Herge
Herge marked it as to-read
May 17, 2015
Valentina Ermolova
Valentina Ermolova marked it as to-read
May 16, 2015
0xm4110c
0xm4110c marked it as to-read
May 12, 2015
Aaron
Aaron marked it as to-read
May 06, 2015
Christopher Maddalena
Christopher Maddalena marked it as to-read
May 03, 2015
Yusuf Buali
Yusuf Buali marked it as to-read
Apr 27, 2015
Sennovskiy Innokentiy
Sennovskiy Innokentiy marked it as to-read
Apr 26, 2015
fr4nt1c
fr4nt1c marked it as to-read
Apr 24, 2015
Somaditya Basak
Somaditya Basak marked it as to-read
Apr 17, 2015
David
David marked it as to-read
Apr 16, 2015
Michael Darby
Michael Darby is currently reading it
Apr 14, 2015
Bly
Bly marked it as to-read
Apr 07, 2015
Sean Mayfield
Sean Mayfield marked it as to-read
Apr 06, 2015
MD Butler
MD Butler marked it as to-read
Apr 05, 2015
Mikk
Mikk marked it as to-read
Mar 30, 2015
Prema
Prema marked it as to-read
Mar 31, 2015
Emerson Arcella
Emerson Arcella marked it as to-read
Mar 25, 2015
Nissim
Nissim marked it as to-read
Mar 21, 2015
Barry
Barry marked it as to-read
Mar 21, 2015
Warsoly
Warsoly marked it as to-read
Mar 18, 2015
cacaegg
cacaegg marked it as to-read
Mar 14, 2015
« previous 1 3 4 5 6 7 8 9 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Reversing: Secrets of Reverse Engineering
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • Metasploit: The Penetration Tester's Guide
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • File System Forensic Analysis
  • A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
  • The Art of Software Security Assessment: Identifying and Avoiding Software Vulnerabilities
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • Hacking: The Art of Exploitation
  • Gray Hat Hacking: The Ethical Hacker's Handbook
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  • Rtfm: Red Team Field Manual
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response
  • Assembly Language: Step-By-Step

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »
The Shellcoder's Handbook: Discovering and Exploiting Security Holes The Database Hacker's Handbook: Defending Database Servers

Share This Book