Hacking: The Art of Exploitation
Jon Erickson
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming.
Score based on developer article recommendations — not sales data or reviews.
🟢 Developer Verdict
Explore the underlying mechanics of computer systems, from C and assembly to networking, revealing the art of software exploitation.
Read this if
- ✓ You want to understand low-level system vulnerabilities deeply.
- ✓ You are curious about the technical foundations of ethical hacking.
- ✓ You seek a hands-on guide to C, assembly, and network exploitation.
Skip this for now if
- ✗ You are looking for high-level security policy or management advice.
- ✗ You prefer abstract theory over practical, code-level explanations.
- ✗ You need content on modern web application or cloud security exploits.
📊 Why Developers Recommend
It provides rigorous coverage of algorithms and data structures.
Referenced by multiple developers, suggesting consistent practical value.
Developers value this book for building durable technical understanding, going beyond surface-level patterns into the reasoning behind design decisions.
💬 What Developers Say
"which is also a great guide in exploring C, Assembly, networking concepts, exploitation and more for a beginner."
— noodulz · How to Learn InfoSec and Hacking through Structured Levels · Oct 3, 2020
"An excellent book providing the foundation of hacking and its origins."
— noodulz · How to Learn InfoSec and Hacking through Structured Levels · Oct 3, 2020
"Last on this list, the most important book on a real hacker's library."
— d3adr1nger · The Books that Made me a Hacker · Feb 14, 2021
Based on 4 developer article mentions
👤 Who Should Read This
Best for
- • Developers looking to grow their careers
Less ideal for
- • Readers looking only for quick interview patterns
- • Developers wanting immediate hands-on tutorials
Explore Similar Books
More books in similar categories — browse to discover your next read.
Penetration Testing
Georgia Weidman
View →
The Web Application Hacker's Handbook
Dafydd Stuttard, Marcus Pinto
View →
Web Application Security
Andrew Hoffman
View →
How to Solve It
George Polya
View →
Computer Networking
James Kurose, Keith Ross
View →
Jon Erickson
Mentioned in 4 articles · #262 overall
As an Amazon Associate, we earn from qualifying purchases.
Recommended in 4 Articles
Mastering Cybersecurity: A Comprehensive Guide to Self-Learning
How to Learn InfoSec and Hacking through Structured Levels
10 Book for Programming Beginners
The Books that Made me a Hacker
Score Trend
Last 90 Days
Articles
0
vs prev 90d
0
All Time
Unique authors
4
Total mentions
4