• Complain

Simon - The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers

Here you can read online Simon - The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Hoboken, year: 2009, publisher: John Wiley & Sons, Incorporated., Wiley Imprint, genre: Art. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers
  • Author:
  • Publisher:
    John Wiley & Sons, Incorporated., Wiley Imprint
  • Genre:
  • Year:
    2009
  • City:
    Hoboken
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Annotation

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of DeceptionKevin Mitnick, the worlds most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use social engineering to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnicks reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machinesTwo teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systemsTwo convicts who joined forces to become hackers inside a Texas prisonA Robin Hood hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained accessWith riveting you are there descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnicks own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media. Read more...
Abstract: Annotation

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of DeceptionKevin Mitnick, the worlds most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use social engineering to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnicks reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machinesTwo teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systemsTwo convicts who joined forces to become hackers inside a Texas prisonA Robin Hood hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained accessWith riveting you are there descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnicks own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Table of Contents For Shelly Jaffe Reba Vartanian Chickie Leventhal - photo 1
Table of Contents

For Shelly Jaffe Reba Vartanian Chickie Leventhal Mitchell Mitnick For - photo 2
For Shelly Jaffe, Reba Vartanian, Chickie Leventhal,
Mitchell Mitnick

For Darci and Briannah

And for the late Alan Mitnick, Adam Mitnick,
Sydney Kramer, Jack Biello.

For Arynne, Victoria, Sheldon, and David, and for Vincent and
Elena
Preface
Hackers play one-up among themselves. Clearly one of the prizes would be bragging rights from hacking into my security companys Web site or my personal system.
Another would be that they had made up a story of a hack and planted it on me and my co-author Bill Simon so convincingly that we were taken in, believed it as true, and included it in this book.
That has presented a fascinating challenge, a game of wits that the two of us have played time after time as we did the interviews for the book. For most reporters and authors, establishing authenticity is a fairly routine matter: Is this really the person he or she claims to be? Is this person or was this person really working for the organization he or she claims? Did this person have the position he or she says? Does this person have documentation to back up the story, and can I verify that the documents are valid? Are there reputable people who will support the story or parts of it?
With hackers, checking the bona fides is tricky. Most of the people whose stories appear in this book, other than a few who have already been to prison, would face felony charges if their true identities could be determined. So, asking for real names, or expecting to be offered as proof, is an iffy proposition.
These people have only come forward with their stories because they trust me. They know Ive done time myself, and they are willing to rely on my not betraying them in a way that could put them in that position. Yet, despite the risks, many did offer tangible proof of their hacks.
Even so, its possible in fact, its likely that some people exaggerated their stories with details intended to make them more compelling, or spun a story that was a total fabrication, but constructed around enough workable exploits to give them the ring of truth.
Because of that risk, we have been diligent in holding to a high standard of reliability. Through all the interviews, I have challenged every technical detail, asking for in-depth explanations of anything that didnt sound quite right, and sometimes following up later to see if the story was still the same or if he or she told it differently the second time around. Or, if this person couldnt remember when asked about some hard-to-accomplish step omitted from the story. Or, if this person just didnt seem to know enough to do what he or she claimed or couldnt explain how he or she got from point A to point B.
Except where specifically noted, every one of the main stories in this book has passed my smell test. My co-author and I agreed on the believability of every person whose story we have included. Nevertheless, details have often been changed to protect the hacker and the victim. In several of the stories, the identities of companies are disguised. I modified the names, industries, and locations of targeted organizations. In some cases, there is misleading information to protect the identity of the victim or to prevent a duplication of the crime. However, the basic vulnerabilities and nature of the incidents are accurate.
At the same time, because software developers and hardware manufacturers are continually fixing security vulnerabilities through patches and new product versions, few of the exploits described in these pages still work as described here. This might lead the overconfident reader to decide that he or she need not be concerned, that, with vulnerabilities attended to and corrected, the reader and his or her company have nothing to be worried about. But the lesson of these stories, whether they happened six months ago or six years ago, is that hackers are finding new vulnerabilities every day. Read the book not to learn specific vulnerabilities in specific products, but to change your attitudes and gain a new resolve.
And read the book, too, to be entertained, awed, amazed at the continually surprising exploits of these wickedly clever hackers.
Some are shocking, some are eye-opening, some will make you laugh at the inspired nerve of the hacker. If youre an IT or security professional, every story has lessons for you on making your organization more secure. If youre a non-technical person who enjoys stories of crime, daring, risk-taking, and just plain guts, youll find all that here.
Every one of these adventures involved the danger of a knock at the door, where a posse of cops, FBI agents, and Secret Service types would be waiting with handcuffs ready. And, in a number of the cases, thats exactly what happened.
For the rest, the possibility still remains. No wonder most of these hackers have never been willing to tell their stories before. Most of these adventures you will read here are being published for the very first time.
Acknowledgments
By Kevin Mitnick
This book is dedicated to my wonderful family, close friends, and, most of all, the people that made this book possible the black-hat and white-hat hackers who contributed their stories for our education and entertainment.
The Art of Intrusion was even more challenging to write than our last book. Instead of using our combined creative talent to develop stories and anecdotes to illustrate the dangers of social engineering and what businesses can do to mitigate it, both Bill Simon and I relied heavily on interviewing former hackers, phone phreaks, and hackers turned security professionals. We wanted to write a book that would be both a crime thriller and an eye-opening guide to helping businesses protect their valuable information and computing resources. We strongly believe that by disclosing the common methodologies and techniques used by hackers to break into systems and networks, we can influence the community at large to adequately address these risks and threats posed by savvy adversaries.
I have had the extraordinary fortune of being teamed up with best-selling author Bill Simon, and we worked diligently together on this new book. Bills notable skills as a writer include his magical ability to take information provided by our contributors and write it in such a style and manner that anyones grandmother could understand it. More importantly, Bill has become more than just a business partner in writing, but a loyal friend who has been there for me during this whole development process. Although we had some moments of frustration and differences of opinion during the development phase, we always work it out to our mutual satisfaction. In a little over two years, Ill finally be able to write and publish the The Untold Story of Kevin Mitnick, after certain government restrictions expire. Hopefully, Bill and I will collaborate on this project as well.
Bills wonderful wife, Arynne Simon, also has a warm place in my heart. I appreciate her love, kindness, and generosity that she has shown me in the last three years. My only disappointing experience is not being able to enjoy her great cooking. Now that the book is finally finished, maybe I can convince her to cook a celebration dinner!
Having been so focused on The Art of Intrusion,
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers»

Look at similar books to The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers»

Discussion, reviews of the book The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.