Home | Best Seller | FAQ | Contact Us
Browse
Art & Photography
Biographies & Autobiography
Body,Mind & Health
Business & Economics
Children's Book
Computers & Internet
Cooking
Crafts,Hobbies & Gardening
Entertainment
Family & Parenting
History
Horror
Literature & Fiction
Mystery & Detective
Nonfiction
Professional & Technology
Reference
Religion
Romance
Science
Science Fiction & Fantasy
Sports & Outdoors
Travel & Geography
   Book Info

enlarge picture

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers  
Author: Kevin D. Mitnick
ISBN: 0764569597
Format: Handover
Publish Date: June, 2005
 
     
     
   Book Review


From Publishers Weekly
It would be difficult to find an author with more credibility than Mitnick to write about the art of hacking. In 1995, he was arrested for illegal computer snooping, convicted and held without bail for two years before being released in 2002. He clearly inspires unusual fear in the authorities and unusual dedication in the legions of computer security dabblers, legal and otherwise. Renowned for his use of "social engineering," the art of tricking people into revealing secure information such as passwords, Mitnick (The Art of Deception) introduces readers to a fascinating array of pseudonymous hackers. One group of friends bilks Las Vegas casinos out of more than a million dollars by mastering the patterns inherent in slot machines; another fellow, less fortunate, gets mixed up with a presumed al-Qaeda–style terrorist; and a prison convict leverages his computer skills to communicate with the outside world, unbeknownst to his keepers. Mitnick's handling of these engrossing tales is exemplary, for which credit presumably goes to his coauthor, writing pro Simon. Given the complexity (some would say obscurity) of the material, the authors avoid the pitfall of drowning readers in minutiae. Uniformly readable, the stories—some are quite exciting—will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry. Copyright © Reed Business Information, a division of Reed Elsevier Inc. All rights reserved.


Review
It would be difficult to find an author with more credibility than Mitnick to write about the art of hacking. In 1995, he was arrested for illegal computer snooping, convicted and held without bail for two years before being released in 2002. He clearly inspires unusual fear in the authorities and unusual dedication in the legions of computer security dabblers, legal and otherwise. Renowned for his use of "social engineering," the art of tricking people into revealing secure information such as passwords, Mitnick (The Art of Deception) introduces readers to a fascinating array of pseudonymous hackers. One group of friends bilks Las Vegas casinos out of more than a million dollars by mastering the patterns inherent in slot machines; another fellow, less fortunate, gets mixed up with a presumed al-Qaeda–style terrorist; and a prison convict leverages his computer skills to communicate with the outside world, unbeknownst to his keepers. Mitnick's handling of these engrossing tales is exemplary, for which credit presumably goes to his coauthor, writing pro Simon. Given the complexity (some would say obscurity) of the material, the authors avoid the pitfall of drowning readers in minutiae. Uniformly readable, the stories—some are quite exciting—will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry. Agent, David Fugate. (Mar.) (Publishers Weekly, February 14, 2005)

Infamous criminal hacker turned computer security consultant Mitnick offers an expert sequel to his best-selling The Art of Deception, this time supplying real-life rather than fictionalized stories of contemporary hackers sneaking into corporate servers worldwide. Each chapter begins with a computer crime story that reads like a suspense novel; it is a little unnerving to learn how one's bank account is vulnerable to digital thieves or how hackers with an interest in gambling can rake in thousands of dollars in just minutes at a compromised slot machine. The hack revealed, Mitnick then walks readers step by step through a prevention method. Much like Deception, this book illustrates that hacking techniques can penetrate corporate and government systems protected by state-of-the-art security.
Mitnick's engaging writing style combines intrigue, entertainment, and education. As with Deception, information technology professionals can learn how to detect and prevent security breaches, while informed readers can sit back and enjoy the stories of cybercrime. Recommended for most public and academic libraries. --Joe Accardi, William Rainey Harper Coll. Lib., Palatine, IL (Library Journal, January 15, 2005)


Review
"Uniformly readable, some quite exciting...will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry." (Publishers Weekly, February 14, 2005)

"...engaging writing style combines intrigue, entertainment, and education". (Library Journal, January 15, 2005)


Book Description
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.


From the Inside Flap
Four pals clean up in Vegas with a pocket-sized computer. A bored Canadian teen gains access to the wire transfers section of a major Southern bank. A couple of kids are recruited to hack into Lockheed Martin and the Defense Information System Network by a terrorist with ties to Osama bin Laden.

And these stories are true.

If you're the security officer in your organization, the tales in this book crawled out of that closet where your nightmares live. Fears about national security keeping you awake? Put the coffee on; it gets worse. And if you just enjoy a heck of a good cliff-hanger full of spies and real-life intrigue, strap yourself in for a wild read.


From the Back Cover
"Enter the hostile world of computer crime from the comfort of your own armchair. Mitnick presents ten compelling chapters, each the result of an interview with a real hacker about a real attack. A must-read for anyone with an interest in information security" —Tom Parker, Computer Security Analyst and founder of Global InterSec LLC

"It boggles the mind to contemplate the tremendous brilliance that goes into these illegal deeds. Imagine how much could be accomplished if these geniuses would use their skills for good. Whether for entertainment or education, I recommend this book." —About.com

Praise for The Art of Deception

"Finally someone is onto the real cause of data security breaches—stupid humans. . . . Mitnick . . . reveals clever tricks of the 'social engineering' trade and shows how to fend them off." —Stephen Manes, Forbes

"A tour de force, a series of tales of how some old-fashioned blarney and high-tech skills can pry any information from anyone. As entertainment, it's like reading the climaxes of a dozen complex thrillers, one after the other." —Publishers Weekly


About the Author
Kevin Mitnick, whose own exploits have made him a veritable hacker's hero, shares more than a dozen true stories of cyber-invasions—devilishly ingenious, highly effective schemes that kick up your pulse rate even as you marvel at their sheer audacity. Each is followed by Mitnick's expert analysis of how the attack could have been prevented. And he is uniquely qualified to recommend effective security measures. Both a legend in the hacker underworld and a general in the war on cybercrime, Kevin Mitnick holds the one weapon most likely to take down the intruder—intimate knowledge of the hacker's brilliant and tenacious mind.

WILLIAM L. SIMON is an award-winning author and screenwriter who also collaborated with Kevin Mitnick on The Art of Deception.




The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers

FROM OUR EDITORS

The Barnes & Noble Review
The real truth about crackers￯﾿ᄑ exploits is notoriously elusive. For obvious reasons, few seek to attract attention. Nor do their victims. But if there￯﾿ᄑs one person capable of collecting this generation￯﾿ᄑs most amazing hacking stories -- and assessing their veracity -- it￯﾿ᄑs Kevin Mitnick.

The legendary Mitnick spent years in prison for his computer intrusions, becoming the focal point of the hacker community￯﾿ᄑs global Free Kevin movement. When he put out the word that he was looking for true stories for his next book, The Art of Intrusion, they flooded in. Mitnick, now a security consultant, cross-examined each interviewee, demanding in-depth explanations (and, in many cases, eliciting physical proof). In other words, the stories in this book are almost certainly true.

And great stories they are. Mitnick leads off with the team that reverse-engineered Vegas slot machines and learned how to predict jackpots. Next, he reveals the games of footsie that crackers were playing with purported terrorists in the years before 9/11: Were they real terrorists or FBI agents pretending to be?

There￯﾿ᄑs a bank attack that gave a hacker control over generating wire transfers (Swiss bank accounts, anyone?). You￯﾿ᄑll go beyond the scenes with l0pht at one of its major penetration testing projects; then watch another ￯﾿ᄑpen test￯﾿ᄑ completely own one of the world￯﾿ᄑs top biotech firms. There are attacks on software companies, aerospace companies, e-commerce providers, prisons, and even (briefly) the White House. Don￯﾿ᄑt want intrusions like these to happen to you? Every chapter ends with countermeasures.

A fascinating read, whether you wear a black, gray, or white hat -- or none at all. Bill Camarda, from the May 2005 Read Only

FROM THE PUBLISHER

"Four pals clean up in Vegas with a pocket-sized computer. A bored Canadian teen gains access to the wire transfers section of a major Southern bank. A couple of kids are recruited to hack into Lockheed Martin and the Defense Information System Network by a terrorist with ties to Osama bin Laden." Kevin Mitnick, whose own exploits have made him a veritable hacker's hero, shares more than a dozen true stories of cyber-invasions - devilishly ingenious, highly effective schemes that kick up your pulse rate even as you marvel at their sheer audacity. Each is followed by Mitnick's expert analysis of how the attack could have been prevented. And he is uniquely qualified to recommend effective security measures. Both a legend in the hacker underworld and a general in the war on cybercrime, Kevin Mitnick holds the one weapon most likely to take down the intruder - intimate knowledge of the hacker's brilliant and tenacious mind.

FROM THE CRITICS

Publishers Weekly

It would be difficult to find an author with more credibility than Mitnick to write about the art of hacking. In 1995, he was arrested for illegal computer snooping, convicted and held without bail for two years before being released in 2002. He clearly inspires unusual fear in the authorities and unusual dedication in the legions of computer security dabblers, legal and otherwise. Renowned for his use of "social engineering," the art of tricking people into revealing secure information such as passwords, Mitnick (The Art of Deception) introduces readers to a fascinating array of pseudonymous hackers. One group of friends bilks Las Vegas casinos out of more than a million dollars by mastering the patterns inherent in slot machines; another fellow, less fortunate, gets mixed up with a presumed al-Qaeda-style terrorist; and a prison convict leverages his computer skills to communicate with the outside world, unbeknownst to his keepers. Mitnick's handling of these engrossing tales is exemplary, for which credit presumably goes to his coauthor, writing pro Simon. Given the complexity (some would say obscurity) of the material, the authors avoid the pitfall of drowning readers in minutiae. Uniformly readable, the stories-some are quite exciting-will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry. Agent, David Fugate. (Mar.) Copyright 2005 Reed Business Information.

Library Journal

Infamous criminal hacker turned computer security consultant Mitnick offers an expert sequel to his best-selling The Art of Deception, this time supplying real-life rather than fictionalized stories of contemporary hackers sneaking into corporate servers worldwide. Each chapter begins with a computer crime story that reads like a suspense novel; it is a little unnerving to learn how one's bank account is vulnerable to digital thieves or how hackers with an interest in gambling can rake in thousands of dollars in just minutes at a compromised slot machine. The hack revealed, Mitnick then walks readers step by step through a prevention method. Much like Deception, this book illustrates that hacking techniques can penetrate corporate and government systems protected by state-of-the-art security. Mitnick's engaging writing style combines intrigue, entertainment, and education. As with Deception, information technology professionals can learn how to detect and prevent security breaches, while informed readers can sit back and enjoy the stories of cybercrime. Recommended for most public and academic libraries.-Joe Accardi, William Rainey Harper Coll. Lib., Palatine, IL Copyright 2005 Reed Business Information.

     



Home | Private Policy | Contact Us
@copyright 2001-2005 ReadingBee.com