After waiting for this book for many months I was excited to see a package from Amazon earlier today. I knew right away it was this book. Not waisting any time I opened the package and rushed to the table of contents not exactly knowing what to expect, but knowing it's going to be good because it's Kris Kaspersky after all, the man who wrote "Hacker Disasssembling Uncovered". It was very promising for most part. A few things confused me a little bit though... making me look at the cover of the book a couple of times. For example, what does GPRS have to do with shellcode? But I thought, "As long as the other stuff is as good as it sounds I don't mind a few offtopic pages". Unfortunately, not a single chapter managed to deliver on the expectations. There's very little about actual shellcode programming. I saw some basic discussions about what functionality shellcode has along with occasional assembly snippets and that's about it. Chapters are short and provide only a brief introduction into the topics they are suppose to cover. In general, this is very much a beginner's book because if you know anything about writing exploits you know pretty much everything in the book (except the offtopic chapters, which the book has a lot of; e.g., "databases under attack", "sniffing a lan", "attacking bluetooth", a couple of chapters on GPRS, etc). Very disappointing... I don't think it deserves its title. It should have been called "Some stuff about overflows and shellcode along with a whole bunch of unrelated meteral that you'll be left wondering about".
Verdict: If you have money to spend and you don't know what shellcode is, you won't waste your money when you buy this book. Otherwise buy "The Art of Computer Virus Research and Defense". It's not about shellcode programming, but it's definitely much more useful. If you really want to know about shellcode programming get "The Shellcoders's Handbook".
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Shellcoder's Programming Uncovered First Edition
by
Kris Kaspersky
(Author)
How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, patches, and firewalls that try in vain to withstand the storm of attacks. Some software's effectiveness exists only in the imaginations of its developers because they prove unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems (both Windows and Unix), and how to do away with security holes altogether. Unpublished advanced exploits and techniques in both C and Assembly languages are included.
- ISBN-10193176946X
- ISBN-13978-1931769464
- EditionFirst Edition
- PublisherA-List Pub
- Publication dateJanuary 1, 2005
- LanguageEnglish
- Dimensions7.25 x 1.25 x 9 inches
- Print length502 pages
Editorial Reviews
About the Author
Kris Kaspersky is a technical writer and the author of CD Cracking Uncovered, Code Optimization, and Hacker Disassembling Uncovered.
Product details
- Publisher : A-List Pub; First Edition (January 1, 2005)
- Language : English
- Paperback : 502 pages
- ISBN-10 : 193176946X
- ISBN-13 : 978-1931769464
- Item Weight : 1.91 pounds
- Dimensions : 7.25 x 1.25 x 9 inches
- Best Sellers Rank: #6,503,563 in Books (See Top 100 in Books)
- #14,810 in Computer Security & Encryption (Books)
- #24,599 in Computer Software (Books)
- #38,223 in Computer Science (Books)
- Customer Reviews:
Customer reviews
3 out of 5 stars
3 out of 5
1 global rating
How customer reviews and ratings work
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon