Bookbot

Kevin D. Mitnick

    Kevin Mitnick, un hacker informático de renombre mundial, ha pasado de ser un fugitivo del ciberespacio a un destacado consultor de seguridad. Sus escritos profundizan en el complejo mundo del engaño y la intrusión, ofreciendo perspectivas únicas sobre los aspectos psicológicos y técnicos de la seguridad digital. El trabajo de Mitnick se caracteriza por su examen directo de cómo se pueden comprometer los sistemas y las mentes que impulsan tales acciones. Colabora con William Simon, un autor consumado con una amplia experiencia en escritura sobre tecnología y negocios, que aporta un estilo narrativo pulido a sus exploraciones.

    Kevin D. Mitnick
    Die Kunst der Täuschung
    Duch w sieci
    The Art of Deception
    The Art of Intrusion
    Ghost in the Wires
    The Art of Invisibility
    • Duch w sieci

      • 432 páginas
      • 16 horas de lectura

      W latach 90., kiedy komputery i internet wyglądały i działały nieco inaczej niż dziś, Kevin Mitnick był niezwykle utalentowanym hakerem. Trudno zliczyć systemy komputerowe i pozornie doskonałe zabezpieczenia, kt

      Duch w sieci2022
      3,5
    • The Art of Invisibility

      The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

      • 320 páginas
      • 12 horas de lectura

      Real-world advice on how to be invisible online from "the FBI's most-wanted hacker" ( Wired ) Your every step online is being tracked and stored, and your identity easily stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, computer-security expert Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, and teaches you "the art of invisibility": online and everyday tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. Invisibility isn't just for superheroes--privacy is a power you deserve and need in the age of Big Brother and Big Data.

      The Art of Invisibility2017
      4,1
    • Ghost in the Wires

      • 530 páginas
      • 19 horas de lectura

      Kevin Mitnick's long-awaited memoir of computer hacking and FBI skirting, revealed now after seven years of government-mandated silence.

      Ghost in the Wires2012
      4,1
    • The Art of Intrusion

      • 288 páginas
      • 11 horas de lectura

      Hacker extraordinaire Kevin Mitnick delivers an explosive follow-up to his bestselling work, focusing on aiding businesses and governments in combating data thieves and cybervandals. In his previous book, Mitnick illustrated how savvy hackers use "social engineering" to breach even the most secure systems through fictionalized case studies. Now, he presents real-life stories of computer break-ins, revealing how victims could have prevented these incidents. Mitnick's credibility within the hacker community allowed him to gain insights from the perpetrators, sharing their exploits for the first time. Among the stories are a group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines, two teenagers manipulated by terrorists to hack Lockheed Martin's systems, convicts who became hackers inside a Texas prison, and a "Robin Hood" hacker who accessed prominent companies' systems and informed them of their vulnerabilities. With gripping descriptions of actual break-ins, essential security tips for professionals, and Mitnick's sharp commentary, this book is poised to capture a broad audience, drawing interest from law enforcement and the media alike.

      The Art of Intrusion2005
      3,9
    • Die Kunst der Täuschung

      Risikofaktor Mensch

      Kevin Mitnick, einst der meistgesuchte Verbrecher der USA, saß fünf Jahr lang im Gefängnis, weil er in zahlreiche Netzwerke großer Firmen eingebrochen war. Dabei bediente er sich häufig nicht nur seiner umfassenden technischen Hacker- Kenntnisse, sondern überlistete praktisch jedes Sicherheitssystem, indem er sich Passwörter erschlich, in Mülltonnen nach sicherheitsrelevanten Informationen suchte und falsche Identitäten vorgaukelte.§Kevin Mitnick enthüllt in diesem Buch, wie die größte Schwachstelle in jedem IT- Sicherheitssystem für Angriffe ausgenutzt werden kann - der Mensch. Er führt den Leser in die Denk- und Handlungsweise von Hackern ein, beschreibt konkrete Betrugsszenarien und zeigt eindrucksvoll die folgenschweren Konsequenzen, die sich aus diesen Einbrüchen ergeben. Dabei nimmt Mitnick sowohl die Perspektive des Angreifers wie auch des Opfers ein und erklärt damit, wieso jeder Angriff so erfolgreich war - und wie man sich effektiv dagegen schützen kann.

      Die Kunst der Täuschung2003
      3,4
    • The Art of Deception

      Controlling The Human Element of Security

      • 304 páginas
      • 11 horas de lectura

      The world's most infamous hacker provides an insider's perspective on low-tech threats to high-tech security. Kevin Mitnick's exploits as a fugitive led to one of the most extensive FBI manhunts in history, inspiring numerous articles, films, and documentaries. Since his release from prison in 1998, he has transformed his life and become a highly sought-after computer security expert. In this work, Mitnick emphasizes the human factors in information security, arguing that firewalls and encryption alone cannot thwart a determined grifter or a disgruntled employee. Through captivating true stories of successful attacks on businesses and government, he demonstrates the vulnerability of even the most secure systems to a skilled con artist posing as an authority figure. By narrating from both the attackers' and victims' perspectives, he reveals the reasons behind each attack's success and how they could have been avoided, all in an engaging style reminiscent of true crime. Most importantly, Mitnick offers practical advice for preventing social engineering hacks through effective security protocols, training programs, and manuals that focus on the human element of security.

      The Art of Deception2002
      3,8