The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

Sold by John Wiley & Sons
49
Free sample

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:
  • A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines
  • Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems
  • Two convicts who joined forces to become hackers inside a Texas prison
  • A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access
With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
Read more

About the author

Kevin D. Mitnick, bestselling author of The Art of Deception, may be the most celebrated hacker ever to "go legit" and apply his considerable skills to helping organizations protect themselves from people like himself. Considered an authority on preventing security breaches, he has appeared on Good Morning America, 60 Minutes, and others.

William L. Simon is coauthor of The Art of Deception and the bestseller iCon: Steve Jobs, also published by Wiley.

Read more

Reviews

4.4
49 total
Loading...

Additional Information

Publisher
John Wiley & Sons
Read more
Published on
Mar 17, 2009
Read more
Pages
288
Read more
ISBN
9780470503829
Read more
Language
English
Read more
Genres
Computers / Networking / General
Computers / Security / General
Read more
Content Protection
This content is DRM protected.
Read more
Read Aloud
Available on Android devices
Read more

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Kevin D. Mitnick
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
Parmy Olson
A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec.

WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec.

In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.

Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?

WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
Glenn Greenwald
The New York Times Bestseller

In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor and whistleblower Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy. As the arguments rage on and the government considers various proposals for reform, it is clear that we have yet to see the full impact of Snowden's disclosures.

Now for the first time, Greenwald fits all the pieces together, recounting his high-intensity ten-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with never-before-seen documents entrusted to him by Snowden himself.
Going beyond NSA specifics, Greenwald also takes on the establishment media, excoriating their habitual avoidance of adversarial reporting on the government and their failure to serve the interests of the people. Finally, he asks what it means both for individuals and for a nation's political health when a government pries so invasively into the private lives of its citizens—and considers what safeguards and forms of oversight are necessary to protect democracy in the digital age. Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state.

Bruce Schneier
“Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”—Clay Shirky

“Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”—Clay Shirky

Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.

The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.

Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.

Gary E. Schwartz
An esteemed scientist's personal journey from skepticism to wonder and awe provides astonishing answers to a timeless question: Is there life after death?
Are love and life eternal? This exciting account presents provocative evidence that could upset everything that science has ever taught. Daring to risk his worldwide academic reputation, Dr. Gary E. Schwartz, along with his research partner Dr. Linda Russek, asked some of the most prominent mediums in America -- including John Edward, Suzane Northrup, and George Anderson -- to become part of a series of extraordinary experiments to prove, or disprove, the existence of an afterlife.
THE AFTERLIFE EXPERIMENTS
This riveting narrative, with its electrifying transcripts, puts the reader on the scene of a breakthrough scientific achievement: contact with the beyond under controlled laboratory conditions. In stringently monitored experiments, leading mediums attempted to contact dead friends and relatives of "sitters" who were masked from view and never spoke, depriving the mediums of any cues. The messages that came through stunned sitters and researchers alike.
Here, as they unfolded in the laboratory setting, are uncanny revelations about a son's suicide, what a deceased father wanted to say about his last days in a coma, the transformation of a man's lifelong doubts about the afterlife, and, most amazing of all, a forecast of a beloved spouse's death. Dr. Schwartz was forced by the overwhelmingly positive data to abandon his skepticism, reaching some startling conclusions.
Compelling from the first page to the last, The Afterlife Experiments is the amazing documentation of groundbreaking experiments you will never forget.
Kevin D. Mitnick
Ob Sie wollen oder nicht – jede Ihrer Online-Aktivitäten wird beobachtet und analysiert

Sie haben keine Privatsphäre. Im Internet ist jeder Ihrer Klicks für Unternehmen, Regierungen und kriminelle Hacker uneingeschränkt sichtbar. Ihr Computer, Ihr Smartphone, Ihr Auto, Ihre Alarmanlage, ja sogar Ihr Kühlschrank bieten potenzielle Angriffspunkte für den Zugriff auf Ihre Daten.

Niemand kennt sich besser aus mit dem Missbrauch persönlicher Daten als Kevin Mitnick. Als von der US-Regierung ehemals meistgesuchter Computer-Hacker kennt er alle Schwachstellen und Sicherheitslücken des digitalen Zeitalters. Seine Fallbeispiele sind spannend und erschreckend: Sie werden Ihre Aktivitäten im Internet neu überdenken.

Mitnick weiß aber auch, wie Sie Ihre Daten bestmöglich schützen. Er zeigt Ihnen anhand zahlreicher praktischer Tipps und Schritt-für-Schritt-Anleitungen, was Sie tun können, um online und offline anonym zu sein.

Bestimmen Sie selbst über Ihre Daten. Lernen Sie, Ihre Privatsphäre im Internet zu schützen. Kevin Mitnick zeigt Ihnen, wie es geht.


Hinterlassen Sie keine Spuren

● Sichere Passwörter festlegen und verwalten
● Mit dem Tor-Browser im Internet surfen, ohne Spuren zu hinterlassen
● E-Mails und Dateien verschlüsseln und vor fremden Zugriffen schützen
● Öffentliches WLAN, WhatsApp, Facebook & Co. sicher nutzen
● Sicherheitsrisiken vermeiden bei GPS, Smart-TV, Internet of Things und Heimautomation
● Eine zweite Identität anlegen und unsichtbar werden

Kevin Mitnick
...cu o prefață de Steve Wozniak, cofondator Apple

Cel mai șiret „spărgător“ de computere și de rețele de comunicații își dezvăluie trucurile într-o captivantă poveste de viață, cu hackeri și detectivi FBI, cu spionaj informatic și urmăriri spectaculoase pe „autostrăzile“ internetului. Kevin Mitnick a bântuit cele mai securizate sisteme informatice din SUA și, în ciuda vitezei de reacție a autorităților americane, a fost tot timpul cu un pas înainte, evitând numeroasele capcane întinse de agenții de la criminalitate informatică.

Dincolo de ponturile tehnice, Mitnick dezvăluie cu umor în ce fel a reușit să păcălească zeci de angajați ai companiilor de telecomunicații sau funcționari publici, pentru a obține parole vitale, identități false ori softuri râvnite de toți hackerii din lume.

Fantoma rețelelor nu este doar o poveste cu hoți și vardiști în ciberspațiu, ci se vrea și o spovedanie a unui hacker spășit, care n-a vrut decât să-și demonstreze inteligența și care n-a câștigat niciun sfanț de pe urma raidurilor sale virtuale.

„A pătruns în computerele unor corporații, dar nu a distrus niciun fișier, nu a folosit și nici nu a vândut numerele cărților de credit la care a avut acces. A furat software, dar nu l-a vândut niciodată, nimănui. A comis hackingul pur și simplu pentru că voia să-și testeze forțele. A dus o viață palpitantă și cu sufletul la gură, cum vezi doar în cele mai bune filme polițiste.“ – Steve Wozniak, cofondator Apple

„Mă tem nu de ceea ce știu, ci de ceea ce nu știu, iar Kevin Mitnick ne-a demonstrat cât de ignoranți suntem. Dacă vrei să-i bagi în sperieți pe șefii cei mari ca să-ți aprobe bugetul pentru securitate informatică, ajunge să le faci cunoștință cu demonstrațiile ingenioase și palpitante ale lui Mitnick.“ – Steven L. Susman, director de tehnologia informației la Supreme Security Systems

Jay Elliot
Liderazgo para las nuevas generaciones

El camino de Steve Jobs presenta las experiencias, los logros y los retos del hombre que transformó el mundo de las comunicaciones, y ofrece al lector la oportunidad de aplicar esta gran experiencia en su vida personal y profesional.

Jay Elliot, ex vicepresidente de Apple Computer y colega cercano de Steve Jobs, nos descubre el camino que ha marcado la apasionante carrera del cofundador de Apple. Desde su participación en los productos que cambiaron las reglas del juego en las comunicaciones, Apple II y Macintosh, su terrible caída del pedestal y su regreso triunfal a la cima de Apple, hasta su relación con Pixar y el desarrollo del iPod, del iPhone y del iPad.

Complementado con entrevistas exclusivas a las figuras más prominentes de la historia de Apple Computer, este libro brinda una imagen íntima einédita del Steve Jobs que jamás se verá en los medios ni sobre un escenario. El libro explora los principios empresariales del genio detrás de Apple, sus acciones en el diseño de producto y el desarrollo de marcas, los enfrentamientos en las salas de juntas y su mundo fuera de Silicon Valley. Los lectores conocerán al verdadero Steve Jobs, al niño prodigio que cambió para siempre la forma en que trabajamos, jugamos, consumimos y nos comunicamos. Todo a través de la mirada de alguien que trabajó a su lado durante muchos años.

Escrito en colaboración con William L. Simon, El camino de Steve Jobs es el libro que millones de lectores esperaban para seguir el ejemplo de este visionario de las comunicaciones.

©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.