The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and DeceiversWiley, 2005 - 270 pagini Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:
|
Alte ediții - Afișează-le pe toate
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers ... Kevin D. Mitnick,William L. Simon Previzualizare limitată - 2009 |
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers ... Kevin D. Mitnick,William L. Simon Nu există previzualizare disponibilă - 2005 |
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers ... Kevin D. Mitnick,William L. Simon Nu există previzualizare disponibilă - 2005 |
Termeni și expresii frecvente
3COM 3COM device able Adrian Alex application audit authentication backup badge Boeing break-in called cards casino commands company's compromised computer systems Comrade configured connection Costa crack Danny database default domain Dustin employee encrypted Erik exploit firewall gain access gLobaLheLL going guard guys hacker hacking installed internal network Internet IP address Kevin Mitnick Khalid knew laptop looking Louis machine mail server Matt Microsoft Microsoft SQL server Mike Mudge ne0h neoh operating system password hashes phone number port scans prison protect proxy servers puter Robert running says script sensitive SIPRNET social engineering someone source code SQL injection started static passwords story system administrator target telnet there's things thought tion unauthorized upload vulnerability wanted Web server Whurley Zyklon
Referințe la această carte
Data, Networks, Programs. Social and Technical Aspects Dmitry Zinoviev Nu există previzualizare disponibilă - 2005 |
Handbook of Research on Social and Organizational Liabilities in Information ... Gupta, Manish,Sharman, Raj Previzualizare limitată - 2008 |