Haxploitation: Three Recent Books

March 26th, 2008 | Category: Reviews

Networks and network protocols are often seen as sites of control, but extreme connectivity eludes control. Diseases, worms, viruses, these all spread beyond our control because of connectivity — networks — that are beyond our control.

When networks cause problems is it because they work too well, not because they are broken.

“Internet protocols are not running the world. In the end, G. W. Bush is. Not Jon Postel.”
Geert Lovink

The ExploitAlex Galloway and Eugene Thacker respond to Lovink’s claim by pitting traditional hierarchies of control against decentralized networks and their protocols of control. That is, a debate regarding “the power relationship between sovereignty and networks.”

Thus begins The Exploit: A Theory of Networks (University of Minnesota Press). Employing theory from the usual suspects (e.g., Foucault, Baudrillard, Virillio, Deleuze, et al.) in unusual ways, they explore the philosophical hacking of networks, eventually suggesting code for a “Liberated Computer Language.”

HackingSpeaking of, if you’re more interested in the nuts and bolts of computer programming, hacking, exploitation, code, etc., Hacking: The Art of Exploitation (No Starch Press) is your ticket. This huge compendium of code and strategy (now in its second edition) is the most complete manual I’ve ever seen on basic programming, hacking, protocols, and the intricacies of how code works — at the machine level. Yes, from assembly to command line, Hacking has it all. It even comes with a CD of all the code in the book, as well as a stand-alone Linux OS environment, so you can follow along with the text and get your hack on.

oPtion$Pulling a totally different kind of hack, Daniel Lyons a.k.a Fake Steve Jobs turned his blog into a book. oPtion$: The Secret Life of Steve Jobs (Da Capo Press) is the exploits of FSJ, in a meticulous, day-to-day parody of one of the most important people in the world of computers and all of his rich, important friends. If you think a caricature as such can’t endure a book-length treatment, think again. Daniel Lyons keeps the charade lively, interesting, and hilarious all the way through. Even Steve Jobs himself said it’s, “pretty funny.”

Whether it’s at the level of theory, ones and zeros, or identity politics, we all need to find opportunities to become hackers on some level. These three books hold solid examples of hacking the system(s) at all levels.

Also suggested are A Hacker Manifesto by McKenzie Wark, Jamming the Media by Gareth Branwyn, Dark Fiber by Geert Lovink, Pranks and Pranks 2 edited by V. Vale, and T.A.Z.: Temporary Autonomous Zone by Hakim Bey.

What hacker texts do you suggest?

Further Posting:


  • Gyrus said:

    The Hacker Ethic and the Spirit of the Information Age by Pekka Himanen.

  • pampelmoose Dave Allen of Gang of Four’s Music and Media Blog » Pampelmoose Music Media MP3 Technology said:

    […] Starch Press, publisher of geeky but in-depth books (including the best-selling Hacking: The Art of Exploitation), recently posted torrent versions of a couple of its best-selling backlist tech volumes with […]

  • Confluence: Public Relations said:

    April 2008 Reviews…

    C# 3.0 in a Nutshell …if every professional developer working in .NET knew and applied the contents of C# 3.0 in a Nutshell, we’d be in a far better state as a development community and industry. Jon Skeet, Author of C# in Depth, Coding Blog…

  • Confluence: Public Relations said:

    February-March 2008 Reviews…

    .Mac: The Missing Manual I have reviewed quite a number of Missing Manual books and I am always impressed with them. David Pogue is a Mac master and the depth of his knowledge shines through. Roger Bernau,……

  • John David Smith said:

    A must read on the subject that brings social and technology issues together is: Hacking: Digital Media and Technological Determinism by Tim Jordan. Polity (2008), Paperback, 200 pages


  • Hacking 2.0 | Roy Christopher said:

    […] is about as good as these books get. Much like their sister imprint’s book by a similar name (Hacking: The Art of Exploitation on No Starch), this is a solid guide to how to break into things and how to keep someone from […]