PortadaGruposCharlasMásPanorama actual
Buscar en el sitio
Este sitio utiliza cookies para ofrecer nuestros servicios, mejorar el rendimiento, análisis y (si no estás registrado) publicidad. Al usar LibraryThing reconoces que has leído y comprendido nuestros términos de servicio y política de privacidad. El uso del sitio y de los servicios está sujeto a estas políticas y términos.

Resultados de Google Books

Pulse en una miniatura para ir a Google Books.

The Art of Intrusion: The Real Stories…
Cargando...

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (edición 2005)

por Kevin D. Mitnick, William L. Simon

MiembrosReseñasPopularidadValoración promediaMenciones
672934,398 (3.8)3
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.… (más)
Miembro:xzel
Título:The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Autores:Kevin D. Mitnick
Otros autores:William L. Simon
Información:Wiley (2005), Paperback, 288 pages
Colecciones:Tu biblioteca
Valoración:
Etiquetas:Ninguno

Información de la obra

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers por Kevin D. Mitnick

Ninguno
Cargando...

Inscríbete en LibraryThing para averiguar si este libro te gustará.

Actualmente no hay Conversaciones sobre este libro.

» Ver también 3 menciones

Mostrando 1-5 de 9 (siguiente | mostrar todos)
good stories and entertaining. not as good as 'art of deception'. ( )
  zetetic23 | Aug 2, 2022 |
I guess I lean over to this side of modern life, I like the internet and its history.

Well written, informative, understandable and engaging. ( )
  Ken-Me-Old-Mate | Sep 24, 2020 |
I honestly have no memory of this book. I remember reading it while I studied for my CEH. I guess it was good enough to finish, but not good enough to remember. That might be unfair, though, since I consume a decent amount of cyber* related information. It might have just been lost to the noise. ( )
  bhiggs | Apr 7, 2020 |
Enjoyable, fast read. It included enough technical details to keep me interested. But, it did not overwhelm the reader with jargon to the extent that someone without a technical background would be lost. I only wish it was written a bit more recently. Perhaps a follow up will be released in the next few years? I look forward to reading other work by Kevin. ( )
  markgiannullo | Oct 21, 2013 |
Mildly interesting book about the exploits of hackers. Requires some networking knowledge to understand fully. Some of these stories are fairly old (using 386 processes in one story and when warez and torrenting sites were novelties in the other!) but most are still interesting. Social engineering aspects of the book are most interesting, and much of the advice is quite relevant. ( )
  HadriantheBlind | Mar 30, 2013 |
Mostrando 1-5 de 9 (siguiente | mostrar todos)
sin reseñas | añadir una reseña

Pertenece a las series

Pertenece a las series editoriales

Debes iniciar sesión para editar los datos de Conocimiento Común.
Para más ayuda, consulta la página de ayuda de Conocimiento Común.
Título canónico
Título original
Títulos alternativos
Fecha de publicación original
Personas/Personajes
Lugares importantes
Acontecimientos importantes
Películas relacionadas
Epígrafe
Dedicatoria
Información procedente del conocimiento común inglés. Edita para encontrar en tu idioma.
For Shelly Jaffe, Reba Cartanian, Chickie Leventhal, Mitchell Mitnick
For Darci and Briannah
And for the late Alan Mitnick, Adam Mitnick, Sydney Kramer, Jack Biello.
For Arynne, Victoria, Sheldon, and David, and for Vincent and Elena.
Primeras palabras
Información procedente del conocimiento común inglés. Edita para encontrar en tu idioma.
Hackers play one-up among themselves.
Citas
Últimas palabras
Información procedente del conocimiento común inglés. Edita para encontrar en tu idioma.
(Haz clic para mostrar. Atención: puede contener spoilers.)
Aviso de desambiguación
Editores de la editorial
Blurbistas
Idioma original
DDC/MDS Canónico
LCC canónico

Referencias a esta obra en fuentes externas.

Wikipedia en inglés (4)

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

No se han encontrado descripciones de biblioteca.

Descripción del libro
Resumen Haiku

Debates activos

Ninguno

Cubiertas populares

Enlaces rápidos

Valoración

Promedio: (3.8)
0.5
1 2
1.5
2 7
2.5 2
3 29
3.5 7
4 41
4.5 2
5 30

¿Eres tú?

Conviértete en un Autor de LibraryThing.

 

Acerca de | Contactar | LibraryThing.com | Privacidad/Condiciones | Ayuda/Preguntas frecuentes | Blog | Tienda | APIs | TinyCat | Bibliotecas heredadas | Primeros reseñadores | Conocimiento común | 205,082,777 libros! | Barra superior: Siempre visible