The Art of Intrusion
The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
By Kevin D. Mitnick, William L. Simon
Publisher: Wiley
Final Release Date: January 2005
Pages: 288

"Enter the hostile world of computer crime from the comfort of your own armchair. Mitnick presents ten compelling chapters, each the result of an interview with a real hacker about a real attack. A must-read for anyone with an interest in information security."
—Tom Parker, Computer Security Analyst and founder of Global InterSec LLC

"Each chapter begins with a computer crime story that reads like a suspense novel."
—Library Journal

"It would be difficult to find an author with more credibility than Mitnick to write about the art of hacking. . . . [The Art of Intrusion] introduces readers to a fascinating array of pseudonymous hackers. One group bilks Las Vegas casinos out of more than a million dollars by mastering the patterns inherent in slot machines; another fellow, less fortunate, gets mixed up with a presumed al-Qaeda–style terrorist. . . . Uniformly readable, the stories . . . will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry."
—Publishers Weekly

When you're a legend among hackers, they tell you their stories

If you're a computer security officer, these tales crawled out of that closet where your nightmares live. Fears about national security keeping you awake? Put the coffee on; it gets worse. And if you just enjoy a darn good real-life spy story, strap yourself in for a wild read.

Product Details
Recommended for You
Customer Reviews

REVIEW SNAPSHOT®

by PowerReviews
oreillyThe Art of Intrusion
 
4.5

(based on 2 reviews)

Ratings Distribution

  • 5 Stars

     

    (1)

  • 4 Stars

     

    (1)

  • 3 Stars

     

    (0)

  • 2 Stars

     

    (0)

  • 1 Stars

     

    (0)

Reviewed by 2 customers

Sort by

Displaying reviews 1-2

Back to top

 
4.0

Must reading for all computer users

By BigBadWolfe

from Alberta, Canada

About Me Developer, Maker, Security Enthusiast, Sys Admin

Pros

  • Accurate
  • Concise
  • Easy to understand
  • Minimal Technical
  • Real World

Cons

    Best Uses

    • Corp Executives
    • Expert
    • Intermediate
    • Network Admin
    • Novice
    • Security Staff

    Comments about oreilly The Art of Intrusion:

    I found that the book was a very interesting look into the term generally referred to as "hacking". I read through the book quite quickly because I found the content captivating and unique. Looking into to legal/illegal moral/immoral actions of these computer experts, told in a frank and straight forward way. As a security enthusiast I found the discussions of the interesting, giving me insight on how to better secure the systems I am responsible for.

    I had previously read 'The Art of Deception' by the same author and found that in comparison this book was a lot more candid and the format was more of a conversation. Overall the book followed the same architecture: outlining the actions, and reviewing motive, and in many cases consequences. A great underlying message is that doing computer crime will land you in jail.

    In a couple of the cases where the author felt that one of the subjects was unfairly dealt with in the legal system, he tended to a rant a little about his own past, and how unfair he was treated, while interesting, it was not relevant to the story. Beyond the occasional self indulgence by the author I don't have anything else negative to , and think that everyone who is interested in computers should read this book.

     
    5.0

    Best starting book for security

    By xenoist

    from Aachen, NRW, Ger

    About Me Developer, Maker, Sys Admin

    Verified Reviewer

    Pros

    • Easy to understand
    • Helpful examples
    • Well-written

    Cons

      Best Uses

      • Expert
      • Intermediate
      • Novice
      • Student

      Comments about oreilly The Art of Intrusion:

      First of all it's not really deep hardware software knowledge you will find in here.

      Which means you would not get in deep Hex or SQL injection examples.

      If you search for this look for exploit sites like Metasploit or Packet Storm Security.

      It's written as a basic book for system operators, security consultant, software programmer, security firms and like i think people who work with security related things.

      This includes normal PC/Mac/smartphone and Tablet users as well.

      Nice book with examples of social engineering and company practice i have seen self sometimes.

      Displaying reviews 1-2

      Back to top

       
      Buy 2 Get 1 Free Free Shipping Guarantee
      Buying Options
      Immediate Access - Go Digital what's this?
      Ebook: $16.95
      Formats:  ePub, Mobi, PDF