Yahoo Web Search

Search results

  1. Oct 17, 2003 · The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries.

    • Kevin D. Mitnick, William L. Simon
  2. The Art of Deception is a book by Kevin Mitnick that covers the art of social engineering. Part of the book is composed of real stories and examples of how social engineering can be combined with hacking. All, or nearly all, of the examples, are fictional but quite plausible.

  3. Jan 1, 2001 · Kevin D. Mitnick, one of the legendary cyber desperado turned computer security consultant, takes the reader into the complex, supremely confident – often misunderstood as arrogance and curiosity driven mindset of the hacker world as he describes the human element of computer security.

  4. The Art of Deception shows how vulnerable we all are - government, business, and each of us personally - to the intrusions of the social engineer. In this security-conscious era, we spend huge sums on technology to protect our computer networks and data. This book points out how easy

  5. Aug 11, 2020 · The art of deception : controlling the human element of security. by. Mitnick, Kevin D. (Kevin David), 1963-. Publication date. 2002. Topics. Computer security, Internal security, Information technology -- Social aspects, Computer hackers. Publisher. Indianapolis, Ind. : Wiley.

  6. The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries.

  7. Jan 1, 2001 · Using a host of real-world examples, the authors show you how to win an argument, defend a case, recognize a fallacy, see through deception, persuade a skeptic, and turn defeat into victory.

  8. Oct 17, 2003 · The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and...

  9. Using a host of real-world examples, the authors show you how to win an argument, defend a case, recognize a fallacy, see through deception, persuade a skeptic, and turn defeat into victory.

  10. Oct 4, 2002 · The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries.

  1. People also search for