Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Writing Security Tools and Exploits 1st Edition

4.7 out of 5 stars 3 customer reviews
ISBN-13: 978-1597499972
ISBN-10: 9781597499972
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Sell yours for a Gift Card
We'll buy it for $13.28
Learn More
Trade in now
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$29.85 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$49.25 On clicking this link, a new layer will be open
More Buying Choices
26 New from $29.86 19 Used from $29.85
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Save Up to 90% on Textbooks Textbooks
$49.25 FREE Shipping. Only 7 left in stock (more on the way). Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

  • Writing Security Tools and Exploits
  • +
  • Buffer Overflow Attacks: Detect, Exploit, Prevent
  • +
  • Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
Total price: $143.15
Buy the selected items together

Editorial Reviews

About the Author

James C. Foster, Fellow, is the Deputy Director of Global Security Solution Development for Computer Sciences Corporation where he is responsible for the vision and development of physical, personnel, and data security solutions. Preceding CSC, Foster was the Director of Research and Development for Foundstone Inc. and was responsible for all aspects of product, consulting, and corporate R&D initiatives. Prior to joining Foundstone, Foster was an Executive Advisor and Research Scientist with Guardent Inc. and an adjunct author at Information Security Magazine, subsequent to working as Security Research Specialist for the Department of Defense. Foster is also a well published author with multiple commercial and educational papers; and has authored, contributed, or edited for major publications to include Snort 2.1 Intrusion Detection (Syngress, ISBN: 1-931836-04-3), Hacking Exposed, Fourth Edition, Anti-Hacker Toolkit, Second Edition, Advanced Intrusion Detection, Hacking the Code: ASP.NET Web Application Security (Syngress, ISBN: 1-932266-65-8), Anti-Spam Toolkit, Google Hacking for Penetration Techniques (Syngress, ISBN: 1-931836-36-1), and Sockets, Shellcode, Porting and Coding (Syngress ISBN: 1-597490-05-9).
NO_CONTENT_IN_FEATURE


Product Details

  • Paperback: 650 pages
  • Publisher: Syngress; 1 edition (March 11, 2006)
  • Language: English
  • ISBN-10: 9781597499972
  • ISBN-13: 978-1597499972
  • ASIN: 1597499978
  • Product Dimensions: 7 x 1.7 x 8.9 inches
  • Shipping Weight: 2.4 pounds (View shipping rates and policies)
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (3 customer reviews)
  • Amazon Best Sellers Rank: #938,106 in Books (See Top 100 in Books)

More About the Author

Vincent Liu (CISSP) is a Partner at Bishop Fox (formerly Stach & Liu), a security consulting firm providing services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he oversees firm strategy, practice development, and client matters.

Vincent is a recognized expert with regular columns in Dark Reading and SecurityWeek. He has presented at Black Hat, ToorCon, InfoSec World, SANS, and Microsoft BlueHat. In addition to regularly being cited by the press, Vincent has been interviewed and quoted in Al Jazeera, USA Today, NPR, and CSO Magazine. He has also co-authored several industry best-selling books, including: Hacking Exposed Wireless 1st and 2nd Edition; Hacking Exposed Web Applications 3rd Edition, and most recently Web Application Security: A Beginner's Guide.

Prior to founding Bishop Fox, Vincent led the Attack & Penetration team for the Global Security unit at Honeywell International. Before that, he was a consultant with the Ernst & Young Advanced Security Centers and an analyst at the National Security Agency.

Vincent holds a Bachelor of Science and Engineering from the University of Pennsylvania with a major in Computer Science and Engineering and a minor in Psychology.

Customer Reviews

5 star
67%
4 star
33%
3 star
0%
2 star
0%
1 star
0%
See all 3 customer reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback Verified Purchase
Would like just to tell how good this book is (and it is indeed), but I am very disappointed by the fact that no CD is actually included and the companion Web site doesn't seem to exist either. !!

The Editorial review claims:

"The book is accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD also contains a copy of the author-developed Hacker Code Library v1.0."

Well, sorrily, that's NOT true.

Perhaps this confusion is due to changes resulting from the merge of Syngress with ORA, but still not fair with buyers.

Otherwise, if you, like me, are a researcher (or just interested) in the "secure code" area, then buy the book in spite of all.

By far it is the very best book written about these issues. Best in the sense of most useful. Well designed organized, with in deep study of vulnerabilities and associated exploit codes. Shellcode is explained in a rich and fresh way and the Why, How and When of shellcode are explained under an integrated framework.

NASL and MSF are explained and used in detailed and useful examples, and IMHO, this book presents the most easy, clear and condensed explanation about the Race Conditions, Format Strings, and Buffer Overflows problems I ever read yet.

Warning: Not an entry level book. You need to be familiar with several software and hardware architecture concepts to obtain full benefits from it.
Comment 19 of 19 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Great!!!!
As advertised...
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
If you are an IT professional that needs to learn more about security exploitation and how people can get in and abuse your system, this is a great book for this purpose. Very technical book, not for beginners!!

If you work in IT and want to learn about how to keep the hackers out, this text is a worthwhile read for you

**** RECOMMENDED
Comment 4 of 7 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Set up an Amazon Giveaway

Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
Writing Security Tools and Exploits
This item: Writing Security Tools and Exploits
Price: $49.25
Ships from and sold by Amazon.com

Want to discover more products? Check out this page to see more: computer security