Author

Jon Erickson

📖 Overview

Jon Erickson is a computer security researcher and author known for his technical books on hacking, programming, and computer security. His most widely recognized work is "Hacking: The Art of Exploitation," which has become a standard reference text in the field of cybersecurity. Erickson has focused on making complex technical concepts accessible while maintaining technical depth and accuracy. His writing style combines practical examples with detailed explanations of underlying principles, particularly evident in his coverage of buffer overflows, network attacks, and shellcode development. As a programmer and security professional, Erickson has contributed to open-source projects and security tools. His background in offensive security and low-level programming has informed his technical writing, which often emphasizes hands-on learning through carefully constructed examples and demonstrations. The impact of Erickson's work is particularly notable in security education, where his books have been used in both academic and professional training contexts. His publications continue to be referenced in cybersecurity courses and by security practitioners working in the field.

👀 Reviews

Readers consistently highlight Erickson's ability to explain complex technical concepts in "Hacking: The Art of Exploitation." Many note his detailed but clear writing style helps grasp low-level programming and security principles. What readers liked: - Step-by-step explanations with practical examples - Deep technical content that builds foundational knowledge - Includes source code and demonstrations - Focus on understanding concepts vs just showing exploits What readers disliked: - Some content has become dated (particularly in 2nd edition from 2008) - Prerequisites can be challenging for complete beginners - Initial chapters move slowly for experienced programmers Ratings across platforms: Goodreads: 4.35/5 (2,100+ ratings) Amazon: 4.6/5 (890+ ratings) One reader noted: "Unlike other hacking books that just give commands to run, this actually teaches you how things work under the hood." Another mentioned: "The C programming sections assume more background knowledge than advertised." Most reviews recommend it for readers with some programming experience who want to understand security fundamentals.

📚 Books by Jon Erickson

Hacking: The Art of Exploitation A comprehensive guide to hacking techniques covering programming, exploitation, shellcode, and network analysis, featuring practical demonstrations using C programming and assembly language.

👥 Similar authors

Bruce Schneier writes foundational texts on cryptography and security from both technical and policy perspectives. His work "Applied Cryptography" remains a cornerstone reference for understanding cryptographic systems and protocols.

Michael Sikorski specializes in malware analysis and reverse engineering techniques. His book "Practical Malware Analysis" provides detailed methodologies for understanding malicious code through hands-on examples.

Peter Szor focuses on computer virus research and defense mechanisms in operating systems. His book "The Art of Computer Virus Research and Defense" covers both theoretical concepts and practical implementation of virus detection systems.

Chris Eagle writes about reverse engineering and low-level programming with a focus on IDA Pro usage. His book "The IDA Pro Book" provides comprehensive coverage of binary analysis techniques used in security research.

Dafydd Stuttard covers web application security testing and exploitation methods. His book "The Web Application Hacker's Handbook" presents systematic approaches to identifying and exploiting web vulnerabilities through practical examples.