The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
$14.91
Description
- A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines
- Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems
- Two convicts who joined forces to become hackers inside a Texas prison
- A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-and then told them how he gained access
Details
Discover the hidden world of hacking with The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. Written by renowned hacker turned cybersecurity expert Kevin Mitnick, this explosive book will take you on a thrilling journey into the minds of some of the most notorious computer intruders.
In The Art of Deception, Mitnick unveiled the concept of "social engineering" through fictionalized case studies. Now, he goes one step further and presents real-life stories of audacious computer break-ins that will leave you spellbound. Gain unique insights into how cyber criminals manipulate technology to compromise even the most secure systems.
Through his unparalleled connections in the hacker community, Mitnick has gathered hair-raising tales of hacking exploits for the first time. Dive into the riveting accounts of hackers who reverse-engineered slot machines, teenagers lured by terrorists to breach a major defense contractor's systems, and even convicts in a Texas prison who became skilled hackers.
With his expert analysis and commentary, Mitnick offers invaluable tips on security countermeasures that businesses and governments can implement to safeguard against such vulnerabilities. The The Art of Intrusion is not just a book; it's a wake-up call that demands attention from law enforcement agencies, security professionals, and individuals alike. Don't miss out on this eye-opening journey through the dark underbelly of cybersecurity.
Discover More Best Sellers in Security & Encryption
Shop Security & Encryption
Threat Modeling: A Practical Guide for Development Teams
Security & Encryption - Threat Modeling: A Practical Guide for Development Teams
Security & Encryption - Computer Programming: JavaScript, Python, HTML, SQL, CSS: The Step-by-Step Guide for Beginners to Intermediate: Including Some Black Hat Hacking Tips - Bundle 5 books in 1 the #1 Coding Book 2020
Security & Encryption - Password Book: Internet Address And Password Organizer, Password Notebook Journal - 5x8 Inch, Password Keeper Logbook With Elegant Cover
Password Logbook: Internet Password and Username Organizer (Black Cat)
Security & Encryption - Password Logbook: Internet Password and Username Organizer (Black Cat)
Project Zero Trust: A Story About a Strategy for Aligning Security and the Business
Security & Encryption - Project Zero Trust: A Story About a Strategy for Aligning Security and the Business
The Phantom CISO: Time to step out of the shadow
Security & Encryption - The Phantom CISO: Time to step out of the shadow
Security & Encryption - IT Infrastructure for the Complete Beginner: The perfect starter guide for any IT role (Information Technology for the Complete Beginner)



