("Library Journal, January 15, 2005). Much like Deception, this book illustrates that hacking techniques can penetrate corporate and government systems protected by state-of-the-art security. Without being overly technical, though there is a good deal of jargon, Mitnick relays the stories behind the headlines that some of you might remember. There was a problem loading your book clubs. The prose was at times a little rough around the edges, but not too distracting from the overall message of the book. Much like Deception, this book illustrates that hacking techniques can penetrate corporate and government systems protected by state-of-the-art security. Kevin D. Mitnick, bestselling author of The Art of Deception, may be the most celebrated hacker ever to "go legit" and apply his considerable skills to helping organizations protect themselves from people like himself. Given the complexity (some would say obscurity) of the material, the authors avoid the pitfall of drowning readers in minutiae. Your recently viewed items and featured recommendations, Select the department you want to search in, The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. Becoming the Hacker: The Playbook for Getting Inside the Mind of the Attacker, Ethical Hacking: Best Tips and Tricks of Ethical Hacking. Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception. Each chapter begins with a computer crime story that reads like a suspense novel; it is a little unnerving to learn how one's bank account is vulnerable to digital thieves or how hackers with an interest in gambling can rake in thousands of dollars in just minutes at a compromised slot machine. The Great Escape, Ocean's Eleven, The Thomas Crown Affair, I love them all. Uniformly readable, the stories … will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry." It seems like Mitnick could not decide between targeting a technical audience or the layman. The hack revealed, Mitnick then walks readers step by step through a prevention method. If you're a computer security officer, these tales crawled out of that closet where your nightmares live. As with Deception, information technology professionals can learn how to detect and prevent security breaches, while informed readers can sit back and enjoy the stories of cybercrime. Reviewed in the United States on August 30, 2009. Find all the books, read about the author, and more. The writer keeps referring back to himself and his days, in pretty much every chapter, that could be written in a book of its own. Renowned for his use of "social engineering," the art of tricking people into revealing secure information such as passwords, Mitnick ("The Art of Deception) introduces readers to a fascinating array of pseudonymous hackers. Ethical Hacking: Advanced and Effective Measures of Ethical Hacking. All rights Reserved. The hack revealed, Mitnick then walks readers step by step through a prevention method. Recommended for most public and academic libraries. Bring your club to Amazon Book Clubs, start a new book club and invite your friends to join, or find a club that’s right for you for free. The Art of Intrusion. how to prevent history from repeating itself), and any additional insights he might have. Reviewed in the United Kingdom on August 13, 2013. Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. Reviewed in the United Kingdom on August 13, 2017. Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. "Agent, David Fugate. Renowned for his use of "social engineering," the art of tricking people into revealing secure information such as passwords, Mitnick ("The Art of Deception) introduces readers to a fascinating array of pseudonymous hackers. ―Publishers Weekly, When you're a legend among hackers, they tell you their stories. Uniformly readable, the stories-- some are quite exciting-- will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry. Wiley; 26378th edition (December 27, 2005). Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-and then told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience and attract the attention of both law enforcement agencies and the media. In 1995, he was arrested for illegal computer snooping, convicted and held without bail for two years before being released in 2002. Have you always been interested and fascinated by the world of hacking? Fears about national security keeping you awake? |, A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines, Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems, Two convicts who joined forces to become hackers inside a Texas prison. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. New and updated guide about Ai, Machines and Algorithms that influence our life. There's a problem loading this menu right now.