Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

CyberSecurity Summary

Hacking: The Art of Exploitation, 2nd Edition

10 Dec 2024

Description

This Book material is an excerpt from a book titled "Hacking: The Art of Exploitation." It explores the art of hacking through a combination of practical programming examples and theoretical explanations. The book teaches readers the fundamentals of programming languages like C and assembly, security vulnerabilities, and how to exploit them. The book also examines basic cryptography and cryptanalysis, covering topics like WEP encryption, RSA, and SSH. It explains how to develop and use tools for exploiting common security vulnerabilities in various operating systems and network environments.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/Jon-Erickson/dp/1593271441?&linkCode=ll1&tag=cvthunderx-20&linkId=477732219a7affa67f89912053765e6a&language=en_US&ref_=as_li_ss_tlDiscover our free courses in tech and cybersecurity, Start learning today:https://linktr.ee/cybercode_academy

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.