<Embed>
  • List Price: $49.99
  • Save: $31.87 (64%)
In Stock.
Rented from Amazon Warehouse
Fulfilled by Amazon
Due Date: May 27, 2021 Rental Details
  • FREE return shipping at the end of the semester.
  • Access codes and supplements are not guaranteed with rentals.
Arrives: Thursday, Dec 10 Details
Fastest delivery: Wednesday, Dec 9 Details
List Price: $49.99
Save: $13.75 (28%)
& FREE Shipping. Details
Arrives: Thursday, Dec 10 Details
Fastest delivery: Wednesday, Dec 9 Details
In Stock.
As an alternative, the Kindle eBook is available now and can be read on any device with the free Kindle app.
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Ships from Amazon.com
Sold by Amazon.com
Ships from
Amazon.com

Sold by
Amazon.com

Return policy: Returnable until Jan 31, 2021
For the 2020 holiday season, returnable items shipped between October 1 and December 31 can be returned until January 31, 2021.
The Shellcoder's Handbook... has been added to your Cart

Other Sellers on Amazon
$36.24
+ Free Shipping
Sold by: Book Depository US
$34.22
+ $3.99 shipping
Sold by: indoobestsellers
Have one to sell?
Loading your book clubs
There was a problem loading your book clubs. Please try again.
Not in a club? Learn more
Amazon book clubs early access

Join or create book clubs

Choose books together

Track your books
Bring your club to Amazon Book Clubs, start a new book club and invite your friends to join, or find a club that’s right for you for free.
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more

Follow the Authors

Something went wrong. Please try your request again later.


The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition 2nd Edition

4.5 out of 5 stars 84 ratings

See all formats and editions Hide other formats and editions
Price
New from Used from
Kindle
Paperback
$36.24
$32.30 $28.56

Jesse Eisenberg's latest fiction
"When You Finish Saving the World" Listen free with trial
click to open popover

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
    Apple
  • Android
    Android
  • Windows Phone
    Windows Phone
  • Click here to download from Amazon appstore
    Android

To get the free app, enter your mobile phone number.

kcpAppSendButton

Frequently bought together

  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition
  • +
  • Hacking: The Art of Exploitation, 2nd Edition
  • +
  • The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
Total price: $102.94
Buy the selected items together

Special offers and product promotions

Editorial Reviews

From the Inside Flap

The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution vulnerabilities still allow attackers to run code of their choice on your system—with disastrous results.

In a nutshell, this book is about code and data and what happens when the two become confused. You'll work with the basic building blocks of security bugs—assembler, source code, the stack, the heap, and so on. You'll experiment, explore, and understand the systems you're running—and how to better protect them.

  • Become familiar with security holes in Windows, Linux, Solaris, Mac OS X, and Cisco's IOS
  • Learn how to write customized tools to protect your systems, not just how to use ready-made ones

  • Use a working exploit to verify your assessment when auditing a network

  • Use proof-of-concept exploits to rate the significance of bugs in software you're developing

  • Assess the quality of purchased security products by performing penetration tests based on the information in this book

  • Understand how bugs are found and how exploits work at the lowest level

From the Back Cover

The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution vulnerabilities still allow attackers to run code of their choice on your system―with disastrous results.

In a nutshell, this book is about code and data and what happens when the two become confused. You'll work with the basic building blocks of security bugs―assembler, source code, the stack, the heap, and so on. You'll experiment, explore, and understand the systems you're running―and how to better protect them.

  • Become familiar with security holes in Windows, Linux, Solaris, Mac OS X, and Cisco's IOS
  • Learn how to write customized tools to protect your systems, not just how to use ready-made ones

  • Use a working exploit to verify your assessment when auditing a network

  • Use proof-of-concept exploits to rate the significance of bugs in software you're developing

  • Assess the quality of purchased security products by performing penetration tests based on the information in this book

  • Understand how bugs are found and how exploits work at the lowest level


Product details

  • Item Weight : 2.19 pounds
  • Paperback : 744 pages
  • ISBN-10 : 9780470080238
  • ASIN : 047008023X
  • ISBN-13 : 978-0470080238
  • Dimensions : 7.38 x 1.68 x 9.25 inches
  • Publisher : Wiley; 2nd edition (August 3, 2007)
  • Language: : English
  • Customer Reviews:
    4.5 out of 5 stars 84 ratings

Jesse Eisenberg's latest fiction
"When You Finish Saving the World" Listen free with trial

Customer reviews

4.5 out of 5 stars
4.5 out of 5
84 global ratings
How are ratings calculated?

Top reviews from the United States

Reviewed in the United States on February 26, 2017
Verified Purchase
32 people found this helpful
Comment Report abuse
Reviewed in the United States on May 7, 2016
Verified Purchase
22 people found this helpful
Comment Report abuse
Reviewed in the United States on October 6, 2020
Verified Purchase
Reviewed in the United States on January 29, 2018
Verified Purchase
Reviewed in the United States on May 11, 2020
Verified Purchase
Reviewed in the United States on October 9, 2018
Verified Purchase
One person found this helpful
Comment Report abuse
Reviewed in the United States on November 3, 2014
Verified Purchase
5 people found this helpful
Comment Report abuse
Reviewed in the United States on October 15, 2019
Verified Purchase

Top reviews from other countries

M. SMITH
4.0 out of 5 stars Good for reference, not a tutorial
Reviewed in the United Kingdom on August 28, 2012
Verified Purchase
2 people found this helpful
Report abuse
-:-
5.0 out of 5 stars Five Stars
Reviewed in the United Kingdom on November 12, 2015
Verified Purchase
M A Hauser
5.0 out of 5 stars Five Stars
Reviewed in the United Kingdom on June 24, 2015
Verified Purchase
Amazon Customer
5.0 out of 5 stars Five Stars
Reviewed in the United Kingdom on July 24, 2014
Verified Purchase
Giorgio
5.0 out of 5 stars Ottimo libro!
Reviewed in Italy on July 5, 2019
Verified Purchase
One person found this helpful
Report abuse
Pages with related products. See and discover other items: exploit development