The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
$14.91
Description
- A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines
- Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems
- Two convicts who joined forces to become hackers inside a Texas prison
- A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-and then told them how he gained access
Details
Discover the hidden world of hacking with The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. Written by renowned hacker turned cybersecurity expert Kevin Mitnick, this explosive book will take you on a thrilling journey into the minds of some of the most notorious computer intruders.
In The Art of Deception, Mitnick unveiled the concept of "social engineering" through fictionalized case studies. Now, he goes one step further and presents real-life stories of audacious computer break-ins that will leave you spellbound. Gain unique insights into how cyber criminals manipulate technology to compromise even the most secure systems.
Through his unparalleled connections in the hacker community, Mitnick has gathered hair-raising tales of hacking exploits for the first time. Dive into the riveting accounts of hackers who reverse-engineered slot machines, teenagers lured by terrorists to breach a major defense contractor's systems, and even convicts in a Texas prison who became skilled hackers.
With his expert analysis and commentary, Mitnick offers invaluable tips on security countermeasures that businesses and governments can implement to safeguard against such vulnerabilities. The The Art of Intrusion is not just a book; it's a wake-up call that demands attention from law enforcement agencies, security professionals, and individuals alike. Don't miss out on this eye-opening journey through the dark underbelly of cybersecurity.
Discover More Best Sellers in Security & Encryption
Shop Security & Encryption
Security Testing with Raspberry Pi, Second Edition
Security & Encryption - Security Testing with Raspberry Pi, Second Edition
Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan
Security & Encryption - Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan
Security & Encryption - IPHONE 14 USER GUIDE: An Easy, Step-By-Step Guide On Mastering The Usage Of Your New iPhone 14. Learn The Best Tips & Tricks, And Discover The Most Useful ... Out Of Your Device (Beginners & Seniors)
Security & Encryption - Gifts For Grandparents Who Have Everything: Funny Password Keeper Book for Seniors Large Print with Space for Notes – Useful Gag Idea
How I Rob Banks: And Other Such Places
Security & Encryption - How I Rob Banks: And Other Such Places
PowerShell Automation and Scripting for Cybersecurity: Hacking and defense for red and blue teamers
Security & Encryption - PowerShell Automation and Scripting for Cybersecurity: Hacking and defense for red and blue teamers
Security & Encryption - Gifts For Men, Who Want Nothing: Internet Password Logbook Keeper A-Z Tabs, Funny Gag Gift For Him Dad Husband Who Have Everything
CEH Certified Ethical Hacker Bundle, Fifth Edition
Security & Encryption - CEH Certified Ethical Hacker Bundle, Fifth Edition


