Book details
The Art of Intrusion
Kevin D. Mitnick, William L. Simon
Buy the book
A single link, no noise.
Overview
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
Details
- Publisher
- John Wiley & Sons
- Published
- 2009-03-17
- Pages
- 288
- Language
- EN
- Categories
- Computers / Security / General, Computers / Networking / General
- ISBN-13
- 9780470503829
Similar books
Based on category and author.
Handbook of Digital Forensics and Investigation
Eoghan Casey
Hacker's Delight
Henry S. Warren
The Digital Person
Daniel J Solove
Official (ISC)2 Guide to the CISSP CBK
Adam Gordon
Information Security Risk Analysis, Second Edition
Thomas R. Peltier
Strategic Warfare in Cyberspace
Gregory J. Rattray
No ratings yet
Information Warfare and Security
Dorothy Elizabeth Robling Denning
No ratings yet
The Law of Cybercrimes and Their Investigations
George Curtis
No ratings yet
Security and Loss Prevention
Philip Purpura
No ratings yet
Database Nation
Simson Garfinkel
No ratings yet
Cybercrime
Jack M. Balkin
No ratings yet
Information Security Risk Analysis
Thomas R. Peltier
No ratings yet