Read more
Informationen zum Autor Kevin D. Mitnick, bestselling author of The Art of Deception , may be the most celebrated hacker ever to "go legit" and apply his considerable skills to helping organizations protect themselves from people like himself. Considered an authority on preventing security breaches, he has appeared on Good Morning America, 60 Minutes , and others. William L. Simon is coauthor of The Art of Deception and the bestseller iCon: Steve Jobs , also published by Wiley. Klappentext >?Tom Parker, Computer Security Analyst and founder of Global InterSec LLC >? Library Journal "It would be difficult to find an author with more credibility than Mitnick to write about the art of hacking.... [ The Art of Intrusion ] introduces readers to a fascinating array of pseudonymous hackers. One group bilks Las Vegas casinos out of more than a million dollars by mastering the patterns inherent in slot machines; another fellow, less fortunate, gets mixed up with a presumed al-Qaeda-style terrorist.... Uniformly readable, the stories ... will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry." ? Publishers Weekly When you're a legend among hackers, they tell you their stories If you're a computer security officer, these tales crawled out of that closet where your nightmares live. Fears about national security keeping you awake? Put the coffee on; it gets worse. And if you just enjoy a darn good real-life spy story, strap yourself in for a wild read. Zusammenfassung Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In The Art of Intrusion, Mitnick offers hair-raising stories of real-life computer break-ins, and shows how the victims could have prevented them. Inhaltsverzeichnis Chapter 1 Hacking the Casinos for a Million Bucks 1 Chapter 2 When Terrorists Come Calling 23 Chapter 3 The Texas Prison Hack 49 Chapter 4 Cops and Robbers 69 Chapter 5 The Robin Hood Hacker 91 Chapter 6 The Wisdom and Folly of Penetration Testing 115 Chapter 7 Of Course Your Bank Is Secure - Right? 139 Chapter 8 Your Intellectual Property Isn't Safe 153 Chapter 9 On the Continent 195 Chapter 10 Social Engineers - How They Work and How to Stop Them 221 Chapter 11 Short Takes 247 Index 261 ...