10:00am-10:00pm (Fri Off)

061-6511828, 061-6223080 / 0333-6110619

Hacking: The Art Of Exploitation 2nd Edition by Jon Erickson (Author)

  • Publisher: COMPUTER SCIENCE
  • Availability: In Stock
  • SKU: 46043
  • Number of Pages: 488

Rs.1,190.00

Rs.1,395.00

Tags: Advanced Hacking , best books , Best Selling Books , black hat techniques , BSCS cybersecurity , buffer overflow , C programming hacking , Computer Exploitation , Computer Security , Cyber Attacks , Cyber Defense , Cyber Forensics , Cyber Intrusion , Cyber Threats , Cybersecurity , Cybersecurity Concepts , Cybersecurity Manual , Cybersecurity Practices , Cybersecurity Training , Digital Security , Ethical Hacking , ethical hacking advanced , Ethical Hacking Guide , Ethical Hacking Techniques , Exploit Development , Exploit Techniques , Exploitation Methods , good books , Hacker Strategies , Hacker's Handbook , Hacking 2nd Edition , Hacking and Exploitation , hacking book , Hacking Essentials , hacking from scratch , Hacking Fundamentals , Hacking Guidebook , Hacking Knowledge. , Hacking Skills , Hacking Techniques , hacking theory , Hacking Tools , Information Security , Intrusion Detection , Jon Erickson , Jon Erickson hacking , Linux hacker lab , Malware Analysis , Network Defense , Network Security , Penetration Testing , reverse engineering , Security Analysis , Security Breaches , Security Exploitation , Security Exploits , Security Exploits Guide , Security Programming , security research , Security Techniques , Security Vulnerabilities , shellcode , System Security , Vulnerability Assessment

Hacking: The Art of Exploitation – 2nd Edition

Author: Jon Erickson
Binding: Paperback 
Paper Quality: Black White Paper
Category: Cybersecurity, Ethical Hacking, Computer Science, Reverse Engineering
Recommended For:
BSCS, Cybersecurity students, ethical hackers, programmers, reverse engineers, and security enthusiasts who want a deep technical and theoretical understanding of hacking from the ground up.

Key Points:

  1. In-Depth Technical Exploration
    Goes beyond just tool usage — teaches how hacking works at the code and memory level using C programming, Assembly language, and Linux systems.

  2. Covers Core Hacking Concepts
    Includes buffer overflows, memory corruption, shellcode, cryptography, network sniffing, exploitation, and countermeasures.

  3. Live Linux CD for Practice
    Comes with a bootable Linux environment containing all the examples from the book — allowing safe, offline practice with real-world exploits and tools.

  4. Learn to Think Like a Hacker
    Rather than focusing on specific tools, the book teaches how hackers find flaws, write exploits, and understand systems deeply, making you a better defender and coder.

  5. Perfect for Serious Learners
    Best suited for those with basic programming knowledge (especially C) who want to go deep into how low-level exploits actually work.

  6. Author with Real Hacking Experience
    Jon Erickson is a skilled hacker and security researcher, and his hands-on experience reflects in the realistic, detailed examples provided throughout the book.

                                         ════ ★⋆ ═══

Writer                             Jon Erickson (Author)

Recently Viewed Products