this post was submitted on 28 Nov 2023
17 points (100.0% liked)

technology

23218 readers
2 users here now

On the road to fully automated luxury gay space communism.

Spreading Linux propaganda since 2020

Rules:

founded 5 years ago
MODERATORS
 

Interesting collection of books. As always before spending money on these things, remember: everything you buy has two prices. The price you pay to add it to your personal property, and the price you have to pay to make use of it. And the price to make use of technical books is very, very high. A stack of pending books (or games, movies, any media really) can be a demoralizer that leads to you reading fewer books overall. Personally I will not be buying this bundle but will take it as a reference of books to look into specific topics when the mood strikes.

top 3 comments
sorted by: hot top controversial new old
[–] TheHolyChecksum 4 points 2 years ago (1 children)

These books are quite outdated or redundant with freely available courses. It's definitely not worth it, in my opinion.

[–] oktherebuddy@hexbear.net 4 points 2 years ago* (last edited 2 years ago) (1 children)

Interesting! Are there any which are still current in your opinion? What courses would replace the ones which are redundant?

[–] DrJenkem@lemmy.blugatch.tube 4 points 2 years ago

I disagree with the commenter above. NoStarch publishes some of the best security books. Personally, my expertise is in binary exploitation and reverse engineering. The Malware book is great for learning the basics of reverse engineering. Sure a lot of modern Malware is more advanced and using crazy, custom packers and anti-debug techniques. But you'll never learn how to write a custom unpacker if you haven't even learned how to read assembly or defeat basic anti-debugging techniques.

Similar with Hacking: The Art of Exploitation. Yes it largely focuses on exploiting vulnerable apps like it's 1995, no anti-exploit mitigations like NX, ASLR, stack cookies, etc. but binary security has been an iterative process. You won't understand NX or how/why you need a ROP chain if you don't already understand how stack overflows and shellcode work. Starting with a binary resembling one from the 90's is exactly how any class, course, training material, or book on binary exploitation will start, assuming it's intended for beginners.