HomeGroupsTalkExploreZeitgeist
Search Site
This site uses cookies to deliver our services, improve performance, for analytics, and (if not signed in) for advertising. By using LibraryThing you acknowledge that you have read and understand our Terms of Service and Privacy Policy. Your use of the site and services is subject to these policies and terms.
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

The Art of Intrusion: The Real Stories…
Loading...

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers,… (edition 2005)

by Kevin D. Mitnick, William L. Simon

MembersReviewsPopularityAverage ratingMentions
616932,942 (3.81)3
Hacker extraordinaire Kevin Mitnick delivers the explosiveencore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes hislife to helping businesses and governments combat data thieves,cybervandals, and other malicious computer intruders. In hisbestselling The Art of Deception, Mitnick presented fictionalizedcase studies that illustrated how savvy computer crackers use"social engineering" to compromise even the most technically securecomputer systems. Now, in his new book, Mitnick goes one stepfurther, offering hair-raising stories of real-life computerbreak-ins-and showing how the victims could have prevented them.Mitnick's reputation within the hacker community gave him uniquecredibility with the perpetrators of these crimes, who freelyshared their stories with him-and whose exploits Mitnick nowreveals in detail for the first time, including: A group of friends who won nearly a million dollars in LasVegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into theLockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texasprison A "Robin Hood" hacker who penetrated the computer systems ofmany prominent companies-andthen told them how he gainedaccess With riveting "you are there" descriptions of real computerbreak-ins, indispensable tips on countermeasures securityprofessionals need to implement now, and Mitnick's own acerbiccommentary on the crimes he describes, this book is sure to reach awide audience-and attract the attention of both law enforcementagencies and the media.… (more)
Member:JudisR
Title:The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Authors:Kevin D. Mitnick
Other authors:William L. Simon
Info:Wiley (2005), Edition: 1, Hardcover, 270 pages
Collections:Your library
Rating:
Tags:None

Work Information

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin D. Mitnick

None
Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

» See also 3 mentions

Showing 1-5 of 9 (next | show all)
good stories and entertaining. not as good as 'art of deception'. ( )
  zetetic23 | Aug 2, 2022 |
I guess I lean over to this side of modern life, I like the internet and its history.

Well written, informative, understandable and engaging. ( )
  Ken-Me-Old-Mate | Sep 24, 2020 |
I honestly have no memory of this book. I remember reading it while I studied for my CEH. I guess it was good enough to finish, but not good enough to remember. That might be unfair, though, since I consume a decent amount of cyber* related information. It might have just been lost to the noise. ( )
  bhiggs | Apr 7, 2020 |
Enjoyable, fast read. It included enough technical details to keep me interested. But, it did not overwhelm the reader with jargon to the extent that someone without a technical background would be lost. I only wish it was written a bit more recently. Perhaps a follow up will be released in the next few years? I look forward to reading other work by Kevin. ( )
  markgiannullo | Oct 21, 2013 |
Mildly interesting book about the exploits of hackers. Requires some networking knowledge to understand fully. Some of these stories are fairly old (using 386 processes in one story and when warez and torrenting sites were novelties in the other!) but most are still interesting. Social engineering aspects of the book are most interesting, and much of the advice is quite relevant. ( )
  HadriantheBlind | Mar 30, 2013 |
Showing 1-5 of 9 (next | show all)
no reviews | add a review

Belongs to Series

Belongs to Publisher Series

You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
Dedication
For Shelly Jaffe, Reba Cartanian, Chickie Leventhal, Mitchell Mitnick
For Darci and Briannah
And for the late Alan Mitnick, Adam Mitnick, Sydney Kramer, Jack Biello.
For Arynne, Victoria, Sheldon, and David, and for Vincent and Elena.
First words
Hackers play one-up among themselves.
Quotations
Last words
(Click to show. Warning: May contain spoilers.)
Disambiguation notice
Publisher's editors
Blurbers
Original language
Canonical DDC/MDS
Canonical LCC

References to this work on external resources.

Wikipedia in English (4)

Hacker extraordinaire Kevin Mitnick delivers the explosiveencore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes hislife to helping businesses and governments combat data thieves,cybervandals, and other malicious computer intruders. In hisbestselling The Art of Deception, Mitnick presented fictionalizedcase studies that illustrated how savvy computer crackers use"social engineering" to compromise even the most technically securecomputer systems. Now, in his new book, Mitnick goes one stepfurther, offering hair-raising stories of real-life computerbreak-ins-and showing how the victims could have prevented them.Mitnick's reputation within the hacker community gave him uniquecredibility with the perpetrators of these crimes, who freelyshared their stories with him-and whose exploits Mitnick nowreveals in detail for the first time, including: A group of friends who won nearly a million dollars in LasVegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into theLockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texasprison A "Robin Hood" hacker who penetrated the computer systems ofmany prominent companies-andthen told them how he gainedaccess With riveting "you are there" descriptions of real computerbreak-ins, indispensable tips on countermeasures securityprofessionals need to implement now, and Mitnick's own acerbiccommentary on the crimes he describes, this book is sure to reach awide audience-and attract the attention of both law enforcementagencies and the media.

No library descriptions found.

Book description
Haiku summary

Popular covers

Quick Links

Rating

Average: (3.81)
0.5
1 2
1.5
2 7
2.5 2
3 27
3.5 7
4 42
4.5 2
5 30

Is this you?

Become a LibraryThing Author.

 

About | Contact | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 180,119,637 books! | Top bar: Always visible