Klicka på en bild för att gå till Google Book Search.
Laddar... The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceiversav Kevin D. Mitnick
Ingen/inga Laddar...
Gå med i LibraryThing för att få reda på om du skulle tycka om den här boken. Det finns inga diskussioner på LibraryThing om den här boken. good stories and entertaining. not as good as 'art of deception'. ( ) Enjoyable, fast read. It included enough technical details to keep me interested. But, it did not overwhelm the reader with jargon to the extent that someone without a technical background would be lost. I only wish it was written a bit more recently. Perhaps a follow up will be released in the next few years? I look forward to reading other work by Kevin. Mildly interesting book about the exploits of hackers. Requires some networking knowledge to understand fully. Some of these stories are fairly old (using 386 processes in one story and when warez and torrenting sites were novelties in the other!) but most are still interesting. Social engineering aspects of the book are most interesting, and much of the advice is quite relevant. inga recensioner | lägg till en recension
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media. Inga biblioteksbeskrivningar kunde hittas. |
Pågående diskussionerIngen/ingaPopulära omslag
Google Books — Laddar... GenrerMelvil Decimal System (DDC)005.8Information Computing and Information Computer programming, programs, data, security Computer SecurityKlassifikation enligt LCBetygMedelbetyg:
Är det här du? |