Jon EricksonHackingSimilar books

Readers who enjoyed

Hacking: The Art of Exploitation w/CD
4.15 avg. rating
· 1819 Ratings
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead…
Rate it:

also enjoyed

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.…
Rate it:
The Pragmatic Programmer: From Journeyman to Master
Straight from the programming trenches, The Pragmatic Programmer cuts through the increasing specialization and technicalities of modern software development to examine the core process--taking a …
Rate it:
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-…

Rate it:
The C Programming Language
4.44 avg. rating
· 10264 Ratings
This book is meant to help the reader learn how to program in C. It is the definitive reference guide, now in a second edition. Although the first edition was written in 1978, it continues to be a wor…
Rate it:
Effective Modern C++: 42 Specific Ways to Improve Your Use of C++11 and C++14
Coming to grips with C++11 and C++14 is more than a matter of familiarizing yourself with the features they introduce (e.g., auto type declarations, move semantics, lambda expressions, and concurrency…
Rate it:
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ext…
Rate it:
Black Hat Python: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Jus…
Rate it:
The Linux Command Line: A Complete Introduction
You've experienced the shiny, point-and-click surface of your Linux computer--now dive below and explore its depths with the power of the command line.The Linux Command Line takes you from your very f…
Rate it:
Clean Code: A Handbook of Agile Software Craftsmanship
Even bad code can function. But if code isn't clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code…
Rate it:
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking…
Rate it:
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
A chilling, globe-spanning detective story, tracking an elite group of Russian hackers and the future of global warfare

In 2014, the world witnessed the start of an escalating series of cyberattacks. T…
Rate it:
Predictably Irrational: The Hidden Forces That Shape Our Decisions
Why do our headaches persist after taking a one-cent aspirin but disappear when we take a 50-cent aspirin?

Why does recalling the Ten Commandments reduce our tendency to lie, even when we couldn't poss…
Rate it:
Automate the Boring Stuff with Python: Practical Programming for Total Beginners
If you've ever spent hours renaming files or updating hundreds of spreadsheet cells, you know how tedious tasks like these can be. But what if you could have your computer do them for you?

In "Automate…
Rate it:
Red Team Field Manual
4.22 avg. rating
· 985 Ratings
The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man pa…
Rate it:
Clean Architecture
4.19 avg. rating
· 5503 Ratings
Building upon the success of best-sellers The Clean Coder and Clean Code, legendary software craftsman Robert C. "Uncle Bob" Martin shows how to bring greater professionalism and discipline to applica…
Rate it:
Gödel, Escher, Bach: An Eternal Golden Braid
Douglas Hofstadter's book is concerned directly with the nature of “maps” or links between formal systems. However, according to Hofstadter, the formal system that underlies all mental activity transc…
Rate it:
Windows Internals, Part 1: System Architecture, Processes, Threads, Memory Management, and More
The definitive guide–fully updated for Windows 10 and Windows Server 2016 Delve inside Windows architecture and internals, and see how core components work behind the scenes. Led by a team of internal…
Rate it:
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data.

Like it or not, your every move is being…
Rate it:
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (Volume 1 of 2)
The definitive insider's guide to auditing software security is penned by leading security consultants who have personally uncovered vulnerabilities in applications ranging from "sendmail" to Microsof…
Rate it:
Python Crash Course: A Hands-On, Project-Based Introduction to Programming
Python Crash Course is a fast-paced, thorough introduction to programming with Python that will have you writing programs, solving problems, and making things that work in no time.

In the first half of…
Rate it: