The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

1.300,00 EGP

ASIN ‏ : ‎ B000S1M0DG
Publisher ‏ : ‎ Wiley; 1st edition (March 17, 2009)
Publication date ‏ : ‎ March 17, 2009
Language ‏ : ‎ English
File size ‏ : ‎ 1192 KB
Text-to-Speech ‏ : ‎ Enabled
Screen Reader ‏ : ‎ Supported
Enhanced typesetting ‏ : ‎ Enabled
X-Ray ‏ : ‎ Not Enabled
Word Wise ‏ : ‎ Not Enabled
Print length ‏ : ‎ 290 pages
Page numbers source ISBN ‏ : ‎ 0471782661

Description

Price: $13.00
(as of Oct 26,2024 01:25:33 UTC – Details)




ASIN ‏ : ‎ B000S1M0DG
Publisher ‏ : ‎ Wiley; 1st edition (March 17, 2009)
Publication date ‏ : ‎ March 17, 2009
Language ‏ : ‎ English
File size ‏ : ‎ 1192 KB
Text-to-Speech ‏ : ‎ Enabled
Screen Reader ‏ : ‎ Supported
Enhanced typesetting ‏ : ‎ Enabled
X-Ray ‏ : ‎ Not Enabled
Word Wise ‏ : ‎ Not Enabled
Print length ‏ : ‎ 290 pages
Page numbers source ISBN ‏ : ‎ 0471782661

Customers say

Customers find the book interesting, fun, and enjoyable to read. They also appreciate the amazing stories, saying they’re funny and scary. Readers describe the information as good, educational, and analytical. They say the writing is simple and natural, and good for a layperson reader. Overall, customers say the book is worth the price.

AI-generated from the text of customer reviews

This Post Has 10 Comments

  1. HACKING AND PHREAKING!
    I liked the book. It’s a collection of true hacker tales covering what they did, how they did it, and, at the end of each chapter, Kevin Mitnick gives his personal advice on how to mount counter measures to secure your network. I thought the information was interesting and useful, the stories were well chosen, and the book was superbly enjoyable.
    Each chapter is a different case study. And as I read each case, I underlined the technical details used in the story. It wasn’t just all about “social engineering (manipulating people into helping you gain access to a network).” There were software techniques (C++ and Visual Basic) and “command line” utilities such as “traceroute.” There were references to “ports,” such as 53, 25, and 80, and “zone transfers.” Another referenced something called “Nmap,” and a “Cisco device.” Servers and routers were discussed along with “RADIUS” and a “demilitarized zone” and “Transfer Control Protocol.” And that’s only a sampling of the computer networking stuff. There is also a whole bunch of good junk about telephone networks: switches, PBX and all that jazz – the playground of those pesky phreakers. I mention these things because although you do not necessarily have to be a techno-geek to understand this book, you would be miles ahead of you at least knew a little about communication networks. Put it this way, if you’re totally clueless, you probably won’t like this book. On the other hand, if you’re a novice like me, you’ll probably love it. I did.
    As a footnote, my favorite was the chapter about how a small group of people actually hacked into the Las Vegas slot machines. And they made money! After I read that story I was hooked and couldn’t put the book down.

  2. Great book about different types of hacking
    Hopefully, the software holes, in this book, have been closed but there are only three ways that you can be hacked:
    1. missing updates
    2. weak passwords
    3. social engineering
    of course, if there is a zero day vulnerability that the software community knows about but not yet fixed …… then security personnel should be aware.
    This book is entertaining. I’m only at the robinhood chapter but it is well worth buying and reading.

  3. Interesting and informitive!
    The Art of Intrusion by Kevin Mitnick is good reading even if you’re not a wannabe hacker, involved in IT or security. The book is a stand alone collection of hacker stories that illustrates the different motives that drive these highly individual people and the best methods to thwart them. The attacks employ social engineering, scripting and system penetrations in a variety of different industries.
    The importance of the hacker in our cyber run world cannot be understated. If not for the hours, months and sometimes even years they put into capturing other peoples data there would be little reason for corporations to spend money on protecting your information. Everyone knows the hackers are out there and they are like termites, if you don’t check things out on a regular basis your house will fall down.
    Many hackers, once they grow up and need real jobs, become security consultants because they already have on the job experience, most of them have been looking for software vulnerabilities for years. The black hat hackers tend to take a different path and are unpredictable and sometimes dangerous, which forces security to constantly upgrade itself. Complacency in the cyber world is for fools as this book so well illustrates.
    Some of the stories are funny and some scary, all of them are interesting and the text is not over laden with tech. A good read if you’re looking for a little armchair adventure, a must read if you keep any valuable information on your hard drive.

  4. Must read for anyone with an interest in computer security
    While these stories describe different exploits they all provide different lessons and are from that POV well worthwhile. Several of the stories are quite funny (the hacked Coke machine for instance–the password jumped out at me as soon as they said no one could ever guess it) but still worth while. There is too much tendency to depend on hardware solutions when folks don’t realise that those are computers too and they can be hacked just as easily or even more so than a PC. Some of the stories are probably exaggerated as Mitnick admits he was unable to verify all of them particularly the shorts at the end of the book. Some of chapter 10 is probably exaggerated but I used to do pen tests and its certainly overall credible. A very valuable book overall. I can sympathise when some of the “white hat” security experts turn vigilante and deface websites etc. out of frustration. The reason that I left the field was because often my big decision after an audit was “do I just dust off the report I did 2 years ago or do I write a new one” because more often than not nothing had changed and none of the holes had been plugged. Most of the times I wrote a new report were because new vulnerabilities had been added.

  5. Mitnick Breaks Down Hacks in a Very Unique Perspective
    Great book with lots of interesting information. Great opportunity to look behind the curtain so to speak, of one of if not the greatest hacker of our time. Mitnick is a master and you get his perspective on some interesting hacks that have been done in years past. Not the book for you if you’re wanting to learn how he became the best…or maybe it is… Guess you’ll just have to read it for yourself!

  6. The book is in good shape. The only thing l am not happy is that there’s sticker on the cover which couldn’t be removed without giving damage.

  7. Si conoces a nuestro amigo Kevin no te arrepentiras este tanto el art of deception son unas joyas que merecen leer , worth!

Leave a Reply

Your email address will not be published. Required fields are marked *