Security through data

MAIN

  • Home
  • Alerts
  • Blog
  • Events
  • Incidents
  • Tutorials

FEATURED

  • AI
  • Privacy
  • Cryptocurrency
  • Blockchain
  • IoT
  • Deep Web
  • Threat Actors
  • Social Engineering
  • Phishing
  • Malware
  • E-Commerce
  • Deepfake
  • Quantum Computing

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
No Result
View All Result

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

by Kevin Mitnick

in Book, Learning
1 min read

In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use “social engineering” to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them.

Mitnick’s reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:

  • A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines
  • Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems
  • Two convicts who joined forces to become hackers inside a Texas prison
  • A “Robin Hood” hacker who penetrated the computer systems of many prominent companies-and then told them how he gained access

With riveting “you are there” descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick’s own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

GET BOOK

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.
Tags: BooksCybersecurityExploitingHackerHackersHoneypotsKevin MitnickLinuxSoftwareweb applications
20
VIEWS

More Books

Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk
Book

Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk

April 19, 2021

A cyber breach could cost your organization millions of dollars―in 2019, the average cost of a cyber breach for companies...

Dark Energy: Return to Becker Circle
Book

Dark Energy: Return to Becker Circle

April 16, 2021

Cybercrime doesn’t talk. It creeps in and destroys lives right under Gillian’s nose when a cryptojacking scheme lands her boss,...

Cloud DDoS Attack Dataset Creation using Private Cloud Security Testbed
Book

Cloud DDoS Attack Dataset Creation using Private Cloud Security Testbed

April 15, 2021

The main interest of this book is to understand the cloud computing environment, threats in the cloud, cloud DDoS attack...

MORE

Book

Book: Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage

February 1, 2021
Lexicon

LEXICON: FIPS-validated cryptography

March 14, 2021
Book

Book: Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door

January 25, 2021
Documentary

Documentary: Cryptopia: Bitcoin, Blockchains and the Future of the Internet (2020)

February 24, 2021
ADVERTISEMENT

Tags

Books Cybersecurity Hackers Malware Memes Movies Quantum Computing Report Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Alerts
  • Cyber Incidents
  • Blog
  • Events
  • Tutorials
  • Featured
    • AI
    • Privacy
    • Cryptocurrency
    • Blockchain
    • IoT
    • Deep Web
    • Threat Actors
    • Social Engineering
    • Deepfake
    • E-Commerce
    • Malware
    • Phishing
    • Quantum Computing

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.