Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of Deception: Controlling the Human Element of Security

Buy

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."

Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

(HTML tags aren't allowed.)

Griffon in Action
Griffon in Action
As soon as I heard about Griffon in Action, I was eager to get it into my hands. What I expected was a typical Manning In Action book: providing an easy jump start, working from actionable examples, and providing lots of insight about the technology at hand. It turned out that this book not only lived up to my...
Multimedia Data Mining and Knowledge Discovery
Multimedia Data Mining and Knowledge Discovery
Multimedia information is ubiquitous and essential in many applications, and repositories of multimedia are numerous and extremely large. Consequently, researchers and professionals need new techniques and tools for extracting the hidden, useful knowledge embedded within multimedia collections, thereby helping them discover relationships between...
Emerging Viral Diseases of Southeast Asia (Issues in Infectious Diseases, Vol. 4)
Emerging Viral Diseases of Southeast Asia (Issues in Infectious Diseases, Vol. 4)

Southeast Asia has been the breeding ground for many emerging diseases in the past decade, e.g. the avian flu (H5N1) in Hong Kong in 1997, Nipah virus encephalitis in Malaysia in 1998, and, above all, the SARS outbreak in Southern China in 2002. Risk factors contributing to this situation include being economically disadvantaged, sub-standard...


Electromagnetic Wave Scattering from Random Rough Surfaces: Asymptotic Models
Electromagnetic Wave Scattering from Random Rough Surfaces: Asymptotic Models

Electromagnetic wave scattering from random rough surfaces is an active, interdisciplinary area of research with myriad practical applications in fields such as optics, acoustics, geoscience and remote sensing.
Focusing on the case of random rough surfaces, this book presents classical asymptotic models used to describe
...

Running Linux
Running Linux

Linux is the most exciting development today in the UNIX world -- and some would say in the world of the PC-compatible. A complete, UNIX-compatible operating system developed by volunteers on the Internet, Linux is distributed freely in electronic form and for low cost from many vendors. Its software packages include the X Window...

Business Letters (Quickstudy: Business)
Business Letters (Quickstudy: Business)

Outlines the basic concepts of memos, emails, complaints and customer correspondence.
 

...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy