The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers,Used

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers,Used

In Stock
SKU: SONG0471782661
UPC: 884770046976.0
Brand: Wiley
Sale price$8.79 Regular price$12.56
Save $3.77
Quantity
Add to wishlist
Add to compare

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of DeceptionKevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use 'social engineering' to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hairraising stories of reallife computer breakinsand showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with himand whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverseengineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A 'Robin Hood' hacker who penetrated the computer systems of many prominent companiesandthen told them how he gained access With riveting 'you are there' descriptions of real computer breakins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audienceand attract the attention of both law enforcement agencies and the media.

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

Recently Viewed