The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
1100750976
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
The Art of Deception: Controlling the Human Element of Security
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
16.95
In Stock
5
1
The Art of Deception: Controlling the Human Element of Security
368The Art of Deception: Controlling the Human Element of Security
368Related collections and offers
16.95
In Stock
From the B&N Reads Blog
Customer Reviews
Explore More Items
Dan Gookin gets you up to speed so you can get down to work with all the new features of Word 2010!
Bestselling and quintessential For Dummies author Dan Gookin employs his usual fun and friendly
What doesn't kill you makes you stronger! Activate your natural ability to thrive with Resilience For Dummies
Stress, anxiety, and exhaustion are all-too-common features of our crazy-paced,
Do the numbers in double-quick time with this trusted QuickBooks bestseller!
Running your own business can be cool, but some of the financial side—accounting and payroll, for instance—is
Diversify your portfolio with gold and silver
Investing and trading in gold and silver is always a sound idea—and that goes double in a time of unusual market fluctuation. As people look for
"Theway Brockman interlaces essays about research on the frontiers of science withones on artistic vision, education, psychology and economics is sure to buzzany brain." —Chicago Sun-Times, on
During the 1920s, in more than a dozen cities, over four years, and across two continents, women were being butchered. Eyewitneses claim the perpetrator was a hulking Bible-carrying brute who
The author of The Black Flower “re-creates [a] seminal moment in American history with prose that is vivid, unflinching, and often incantatory” (TheWashington Post Book World).
A
A
In 2004, a California computer whiz named Barrett Lyon uncovered the identity of a hacker running major assaults on business websites. Without fully grasping the repercussions, he set on an
“Philosophy, economics, and biology have rarely been so entertaining.”
—Matt Ridley, author of Genome
Paul J. Zak’s proclivity for taking blood samples has earned him a
—Matt Ridley, author of Genome
Paul J. Zak’s proclivity for taking blood samples has earned him a
How do The Matrix, Avatar, and Tron reveal the future of existence? can our brains recognize where "reality" ends and "virtual" begins? What would it mean to live eternally in a digital universe?
This is the comprehensive reference and technical guide to Microsoft System Center Configuration Manager 2012. A team of expert authors offers step-by-step coverage of related topics in every feature
Barely fifty years ago a computer was a gargantuan, vastly expensive thing that only a handful of scientists had ever seen. The world’s brightest engineers were stymied in their quest to make
Featuring 350 full-color photographs, Knack Slow Cooking presents 350 easy, delicious recipes and variations you can prepare in advance, from contemporary flavors to ethnic recipes to hearty classics.
This thought-provoking and inspirational book covers such topics as: developing a solid creative process through Visual Reflection Notebooks” and Bring Play to Work”;
Volume 25 of The Hacker Digest consists of articles published in 2600
Magazine from 2008 to 2009 on nearly 100 subjects of interest to
hackers and those who want to understand what hacking is all
Magazine from 2008 to 2009 on nearly 100 subjects of interest to
hackers and those who want to understand what hacking is all