The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers (Hardcover)

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers (Hardcover)

作者: Kevin D. Mitnick William L. Simon
出版社: Hungry Minds
出版在: 2005-03-04
ISBN-13: 9780764569593
ISBN-10: 0764569597
裝訂格式: Hardcover
總頁數: 270 頁




內容描述


Description:

Hacker extraordinaire Kevin Mitnick delivers the
explosive encore to his bestselling The Art of DeceptionKevin Mitnick, the
world's most celebrated hacker, now devotes his life to helping businesses and
governments combat data thieves, cybervandals, and other malicious computer
intruders. In his bestselling The Art of Deception, Mitnick presented
fictionalized case studies that illustrated how savvy computer crackers use
"social engineering" to compromise even the most technically secure computer
systems. Now, in his new book, Mitnick goes one step further, offering
hair-raising stories of real-life computer break-ins-and showing how the
victims could have prevented them. Mitnick's reputation within the hacker
community gave him unique credibility with the perpetrators of these crimes,
who freely shared their stories with him-and whose exploits Mitnick now
reveals in detail for the first time, including:

A group of friends who won nearly a million
dollars in Las Vegas by reverse-engineering slot machines
Two teenagers who were persuaded by terrorists
to hack into the Lockheed Martin computer systems
Two convicts who joined forces to become
hackers inside a Texas prison
A "Robin Hood" hacker who penetrated the
computer systems of many prominent companies-andthen told them how he gained
access
With riveting "you are there" descriptions of
real computer break-ins, indispensable tips on countermeasures security
professionals need to implement now, and Mitnick's own acerbic commentary on
the crimes he describes, this book is sure to reach a wide audience-and
attract the attention of both law enforcement agencies and the media.

 
Table of
Contents:

Chapter 1: Hacking the Casinos for a Million
Bucks.
Chapter 2: When Terrorists Come Calling.
Chapter 3: The Texas Prison Hack.
Chapter 4: Cops and Robbers.
Chapter 5: The Robin Hood Hacker.
Chapter 6: The Wisdom and Folly of Penetration
Testing.
Chapter 7: Of Course Your Bank Is Secure — Right?

Chapter 8: Your Intellectual Property Isn’t Safe.

Chapter 9: On the Continent.
Chapter 10: Social Engineers — How They Work and
How to Stop Them.
Chapter 11: Short Takes.
Index.




相關書籍

Cybersecurity Attacks - Red Team Strategies

作者 Rehberger Johann

2005-03-04

Certified Information Security Manager Exam Prep Guide: Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence (Paerback)

作者 Hemang Doshi

2005-03-04

Nmap 滲透測試指南

作者 商廣明

2005-03-04