// Author

John Heasman's cybersecurity books

2 books by John Heasman reviewed in our catalog, newest first. Honest takes, who each book is for, and what to read alongside.

  1. 01 · 2007

    The Shellcoder's Handbook

    Discovering and Exploiting Security Holes

    A foundational text on memory-corruption exploitation across Linux, Windows, Solaris and embedded targets. Pre-modern-mitigations in spirit but still the canonical introduction to the techniques the modern toolchain is built to defeat.

    Advanced
    4/5· Offensive· Binary Exploitation· Reverse Engineering
  2. 02 · 2005

    The Database Hacker's Handbook

    Defending Database Servers

    Litchfield, Anley, Heasman, and Grindlay's exhaustive 2005 reference on attacking and defending Oracle, SQL Server, DB2, MySQL, PostgreSQL, Sybase, and Informix — the era when the database engine itself was the soft target.

    Advanced
    3/5· Databases· AppSec· Exploitation