Absolutely Australia's Lowest Prices

Shop over 1.5 Million Toys in our Huge New Range

The Art of Intrusion
By

Rating
Product Details

Table of Contents

Chapter 1: Hacking the Casinos for a Million Bucks. Chapter 2: When Terrorists Come Calling. Chapter 3: The Texas Prison Hack. Chapter 4: Cops and Robbers. Chapter 5: The Robin Hood Hacker. Chapter 6: The Wisdom and Folly of Penetration Testing. Chapter 7: Of Course Your Bank Is Secure ? Right? Chapter 8: Your Intellectual Property Isn?t Safe. Chapter 9: On the Continent. Chapter 10: Social Engineers ? How They Work and How to Stop Them. Chapter 11: Short Takes. Index.

About the Author

Kevin D. Mitnick, bestselling author of The Art of Deception, may be the most celebrated hacker ever to "go legit" and apply his considerable skills to helping organizations protect themselves from people like himself. Considered an authority on preventing security breaches, he has appeared on Good Morning America, 60 Minutes, and others. William L. Simon is coauthor of The Art of Deception and the bestseller iCon: Steve Jobs, also published by Wiley.

Reviews

" ... a compilation of real hacking stories told to Mitnick by fellow hackers... " ("VNUnet.com, March 2005) It would be difficult to find an author with more credibility than Mitnick to write about the art of hacking. In 1995, he was arrested for illegal computer snooping, convicted and held without bail for two years before being released in 2002. He clearly inspires unusual fear in the authorities and unusual dedication in the legions of computer security dabblers, legal and otherwise. Renowned for his use of "social engineering," the art of tricking people into revealing secure information such as passwords, Mitnick ("The Art of Deception) introduces readers to a fascinating array of pseudonymous hackers. One group of friends bilks Las Vegas casinos out of more than a million dollars by mastering the patterns inherent in slot machines; another fellow, less fortunate, gets mixed up with a presumed al-Qaeda- style terrorist; and a prison convict leverages his computer skills to communicate with the outside world, unbeknownst to his keepers. Mitnick's handling of these engrossing tales is exemplary, for which credit presumably goes to his coauthor, writing pro Simon. Given the complexity (some would say obscurity) of the material, the authors avoid the pitfall of drowning readers in minutiae. Uniformly readable, the stories-- some are quite exciting-- will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry. "Agent, David Fugate. (Mar.) ("Publishers Weekly, February 14, 2005) Infamous criminal hacker turned computer security consultant Mitnick offers an expert sequel to his best-sellingThe Art of Deception, this time supplying real-life rather than fictionalized stories of contemporary hackers sneaking into corporate servers worldwide. Each chapter begins with a computer crime story that reads like a suspense novel; it is a little unnerving to learn how one's bank account is vulnerable to digital thieves or how hackers with an interest in gambling can rake in thousands of dollars in just minutes at a compromised slot machine. The hack revealed, Mitnick then walks readers step by step through a prevention method. Much like Deception, this book illustrates that hacking techniques can penetrate corporate and government systems protected by state-of-the-art security. Mitnick's engaging writing style combines intrigue, entertainment, and education. As with Deception, information technology professionals can learn how to detect and prevent security breaches, while informed readers can sit back and enjoy the stories of cybercrime. Recommended for most public and academic libraries. --Joe Accardi, William Rainey Harper Coll. Lib., Palatine, IL ("Library Journal, January 15, 2005) "Uniformly readable, some quite exciting...will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry." ("Publishers Weekly, February 14, 2005) ..."engaging writing style combines intrigue, entertainment, and education." ("Library Journal, January 15, 2005)

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
Home » Books » Computers » Security » Networking
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond World Ltd.
Back to top