Hacking: The Art of Exploitation - Content

Content

The content of Hacking moves between programming, networking, and cryptography. While well explained, it is a technical piece; some C programming experience is essential, although a basic understanding of networking and cryptography helps as well.

While Hacking is packed with technically accurate, detailed information, it is still a basic introduction to the subject of computer security. Hacking also does not use any notable measure of real-world examples; discussions rarely bring up specific worms and exploits that had previously existed, such as the PNG library overflows or the Blaster worm and related RPC service overflow. Thus, an inexperienced reader may not immediately make the connection between the theory and the reality of attack.

Read more about this topic:  Hacking: The Art Of Exploitation

Famous quotes containing the word content:

    I could be content that we might procreate like trees, without conjunction, or that there were any way to perpetuate the world without this trivial and vulgar way of coition.
    Thomas Browne (1605–1682)

    Not always can flowers, pearls, poetry, protestations, nor even home in another heart, content the awful soul that dwells in clay.
    Ralph Waldo Emerson (1803–1882)

    It is still not enough for language to have clarity and content ... it must also have a goal and an imperative. Otherwise from language we descend to chatter, from chatter to babble and from babble to confusion.
    René Daumal (1908–1944)