Jon Erickson has a formal education in computer science and has been hacking and programming since he was five years old. He speaks at computer security conferences and trains security teams around the world. Currently, he works as a vulnerability researcher and security specialist in Northern California.
"This is a good book. It does a great job of first establishing the mindset of a hacker and then walking the reader step by step through the various techniques of finding interesting ways to solve problems. This
in itself is what the author claims is the defining characteristic of a hacker, and I agree."
--Evan Teran, ;login: The USENIX Magazine, VOL. 33, NO. 3
"While many hacking books show you how to run other people's exploits without really explaining the technical details, Hacking: The Art of Exploitation introduces you to the spirit and theory of hacking as well as the science behind it all."
"This is an excellent book about hacking. It includes a very well written introduction to the C programming language and it contains very useful chapters on Networking and on Cryptology with lots of hands-on examples. I highly recommend it if you want to learn hacking techniques
presented in a systematic way."
"Because the programming chapter is now an introduction, I now recommend this book for the Exploitations chapter alone. This chapter covers buffer and function overflows and the format string vulnerability. Buy the book and discover why strings should be formated like this:
printf("%s", text); and never like this:printf(text);"
--Ed Schaefer, Linux Magazine
"This book will take any programmer well beyond the usual programming
techniques covered in conventional programming books."
--William Wong, Electronic Design
"...if youre more interested in the nuts and bolts of computer programming, hacking, exploitation, code, etc., Hacking: The Art of Exploitation is your ticket. This huge compendium of code and strategy (now in its second edition) is the most complete manual Ive ever seen on basic programming, hacking, protocols, and the intricacies of how code works at the machine level. Yes, from assembly to command line, Hacking has it all. It even comes with a CD of all the code in the book, as well as a stand-alone Linux OS environment, so you can follow along with the text and get your hack on."