Hacking The Art of Exploitation Author:Jon Erickson Emphasizing a true understanding of the techniques as opposed to just breaking the rules, the author helps readers determine which areas are prone to attack and why. Unlike other so-called hacking guides, this book does not gloss over technical details, and includes detailed sections on stack-based overflows, heap based overflows, format string ... more »exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.« less