Beefy Boxes and Bandwidth Generously Provided by pair Networks
laziness, impatience, and hubris
 
PerlMonks  

Re: Boycott O'Reilly

by bmann (Priest)
on Jan 22, 2004 at 07:41 UTC ( #323115=note: print w/ replies, xml ) Need Help??


in reply to Boycott O'Reilly

...Yes, I know I left out some information
And possibly invented some?

Based on the pros and cons you posted, this looks like the review you are looking at. This review of a book called "Hacking - The Art of Exploitation" is a word for word match with your quote.

First of all, it is not an O'Reilly book, it is published by NoStarch Press. Second, I don't think we should condemn O'Reilly for offering this book for sale. I searched their website for both the book and the author, and yes they are selling it - but your local bookstore might just carry it, or maybe something more malicious.

Anyway, this book isn't related to their "Hacking" series - which isn't about breaking into computers and networks, it's about taking something to its limits - Google Hacking means using Google to the fullest extent, for example.

I can't speak for the post-copyright accusation, but based on the facts above I think this rant needs to be retracted.

B


Comment on Re: Boycott O'Reilly
Re: Re: Boycott O'Reilly
by derby (Abbot) on Jan 22, 2004 at 12:51 UTC
    First of all, it is not an O'Reilly book, it is published by NoStarch Press.

    Not that I agree with the OP at all. As I matter of fact, I think it's very much a Hanlon's Razor sort of thing.

    Back to the NoStarch Press thing - they do have some type of major business relationship with OReilly. From nostarch:

    Beginning January 1st, 2004 our US distributor is O'Reilly & Associates (www.oreilly.com). O'Reilly represents No Starch Press books to all major wholesalers (Ingram, Baker & Taylor, Bookazine, Koen, etc.), national chains and independents, online booksellers, and academic and technical bookstores, as well as directly to consumers through direct marketing and trade shows.

    -derby
Re: Re: Boycott O'Reilly
by edoc (Chaplain) on Jan 22, 2004 at 13:11 UTC

    thanks bmann

    mmm.. love that selective quoting Wassercrats, here are the bits you decided not to include...

    Description

    • If you have read Hacking Exposed or Counter Hack- this is the next book you should check out
    • Detailed coverage of string vulnerabilities, stack overflows, heap overflows, and more
    • Shows you how to analyze these vulnerabilities and create your own exploit code
    • A must-have book for vulnerability and penetration testing- clear, concise and informative

    Guide Review - Book Review: Hacking- The Art of Exploitation

    People often talk about whether the hacker technique genre of books such as Hacking Exposed, Hack Attacks Revealed or Counter Hack actually do more to teach the next generation of hackers and crackers than they do to help educate people about security. Those books don't go to nearly the depth that Hacking: The Art of Exploitation does.

    Jon Erickson picks up more or less where those other books leave off. He provides a look at techniques and tools used by hackers as well, but he also gives a more comprehensive look at stack overflows, heap overflows, string vulnerabilities and other commonly exploited weaknesses.

    Arguably, this information could very well be used by a hacker wannabe to learn how to break into machines illegally. However, like the other hacker technique genre books, the purpose is to educate so that we can better protect ourselves from such hackers.

    Armed with the information in this book you can actively develop your own exploit code to conduct vulnerability and penetration testing- the results of which could be very valuable in helping to secure your networks and computers.

    This is an excellent book. Those who are ready to move on to Level 2 should pick this book up and read it thoroughly.

    you're into politics, eh.. never would have guessed..

    cheers,

    J

Log In?
Username:
Password:

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://323115]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others taking refuge in the Monastery: (6)
As of 2014-08-30 10:22 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    The best computer themed movie is:











    Results (292 votes), past polls