Jon Erickson

Jon Erickson has a formal education in computer science and has been hacking and programming since he was five years old. He speaks at computer security conferences and trains security teams around the world. Currently, he works as a vulnerability researcher and security specialist in Northern California.

Hacking: The Art of Exploitation Hacking: The Art of Exploitation (No Starch)
by Jon Erickson
Second Edition January 2008
Print: $49.95
Ebook: $39.95

Hacking Hacking (No Starch)
by Jon Erickson
October 2004
OUT OF PRINT

"Kudos to Jon Erickson for detailing just how involved and complex of a topic network security is in a method that greatly lowers the barrier to getting started. "
--Dave Wreski, LinuxSecurity.com

"This is an excellent book about hacking."
--Chrizna, Chrizna's Blog

"This is a good book. It does a great job of first establishing the mindset of a hacker and then walking the reader step by step through the various techniques of finding interesting ways to solve problems. This in itself is what the author claims is the defining characteristic of a hacker, and I agree."
--Evan Teran, ;login: The USENIX Magazine, VOL. 33, NO. 3

"Hacking: The Art of Exploitation, 2nd Edition was an excellent read."
--Ryan Linn, The Ethical Hacker Network

"While many hacking books show you how to run other people's exploits without really explaining the technical details, Hacking: The Art of Exploitation introduces you to the spirit and theory of hacking as well as the science behind it all."
--sekarygiorg.blogspot.com

"This is an excellent book about hacking. It includes a very well written introduction to the C programming language and it contains very useful chapters on Networking and on Cryptology with lots of hands-on examples. I highly recommend it if you want to learn hacking techniques presented in a systematic way."
--bandonghanh.10001mb.com

"Because the programming chapter is now an introduction, I now recommend this book for the Exploitations chapter alone. This chapter covers buffer and function overflows and the format string vulnerability. Buy the book and discover why strings should be formated like this: printf("%s", text); and never like this:printf(text);"
--Ed Schaefer, Linux Magazine

"This book will take any programmer well beyond the usual programming techniques covered in conventional programming books."
--William Wong, Electronic Design

"...if you’re more interested in the nuts and bolts of computer programming, hacking, exploitation, code, etc., Hacking: The Art of Exploitation is your ticket. This huge compendium of code and strategy (now in its second edition) is the most complete manual I’ve ever seen on basic programming, hacking, protocols, and the intricacies of how code works — at the machine level. Yes, from assembly to command line, Hacking has it all. It even comes with a CD of all the code in the book, as well as a stand-alone Linux OS environment, so you can follow along with the text and get your hack on."
--Roy Christopher