Hacking: The Art of Exploitation - Content

Content

The content of Hacking moves between programming, networking, and cryptography. While well explained, it is a technical piece; some C programming experience is essential, although a basic understanding of networking and cryptography helps as well.

While Hacking is packed with technically accurate, detailed information, it is still a basic introduction to the subject of computer security. Hacking also does not use any notable measure of real-world examples; discussions rarely bring up specific worms and exploits that had previously existed, such as the PNG library overflows or the Blaster worm and related RPC service overflow. Thus, an inexperienced reader may not immediately make the connection between the theory and the reality of attack.

Read more about this topic:  Hacking: The Art Of Exploitation

Famous quotes containing the word content:

    I was not content to believe in a personal devil and serve him, in the ordinary sense of the word. I wanted to get hold of him personally and become his chief of staff.
    Aleister Crowley (1875–1947)

    ... the aspiring immigrant ... is not content to progress alone. Solitary success is imperfect success in his eyes. He must take his family with him as he rises.
    Mary Antin (1881–1949)

    Any so-called material thing that you want is merely a symbol: you want it not for itself, but because it will content your spirit for the moment.
    Mark Twain [Samuel Langhorne Clemens] (1835–1910)