L ART DE LA SUPERCHERIE KEVIN MITNICK PDF

0 Comments

Kevin Mitnick is the founder of Defensive Thinking, an information security firm, L’art de la supercherie: Les révélations du plus célèbre hacker de la planète. Buy L’art de la supercherie by Kevin Mitnick, William-L Simon, Daniel Garance, Raymond Debonne (ISBN: ) from Amazon’s Book Store. Buy L’art de la supercherie by Kevin Mitnick, William-L Simon, Steve Wozniak, Daniel Garance, Raymond Debonne (ISBN: ) from Amazon’s.

Author: Zuluk Mikadal
Country: Lesotho
Language: English (Spanish)
Genre: Marketing
Published (Last): 25 December 2015
Pages: 87
PDF File Size: 6.27 Mb
ePub File Size: 8.98 Mb
ISBN: 216-7-94005-954-3
Downloads: 38880
Price: Free* [*Free Regsitration Required]
Uploader: Moogugami

Kevin Mitnick’s exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Not because it isn’t a good book, just not what I needed.

The first call could be person pretending to be a customer needing some advice. I felt the stories got a bit repetitive as many were similar, and I think half of them could have been cut to make the book more concise; it did begin to drag by the halfway point. Just like any security book, this book can also help the bad guys improve their skills, because it offers many ideas on how you can trick people; however, if the good guys read the book, they would laugh kebin the bad guys’ attempts and say “Ha, I know that one!

Jeremy marked it as to-read Feb aupercherie, Needs updatibg Material is aged and needs updating. Now, in The Art of Deception, the world’s most notorious hacker gives new meaning to the old adage, “It takes a thief to catch a thief. Tyna Edwards rated it really liked it Feb 11, Oh wait, I bought your first book when it came out and I never read it! Mitnik did a solid job of laying out how scoundrels can work their way into your IT systems for malevolent purposes.

Thanks for telling us about the problem. Mitnick, who claims his career as a hacker was passed solely on manipulating people to gain information and access, shares stories of others who did the same. Probably hasn’t aged as well as it could have, but that’s the internet for you. Quotes from The Art of Decept And, dde most importantly, O offers advice mitnkck preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

  LIAHONA NOVIEMBRE 2000 PDF

Good book, I was about done with it half way through though.

The Art of Deception

Nizar Ahammad rated it really liked it Feb 18, That’s not to say social engineers have given up and hung up their hats, it’s likely more prevalent than ever, but this is the Social Engineering book for people taking the on-ramp to the Information Superhighway for the very first time in the early s. Refresh and try again. How did the narrator detract from the book? Something I did not know: Very dry but very informative.

To ask other readers questions about Hacker’s Boxplease sign up.

Co-author William Simon is a bestselling co-author of numerous books, including iCon the biography of Steve Jobs and Kevin Mitnick’s previous two books.

Are the stories in it actually based on real-world incidents, or are they purely hypothetical examples of security incidents that may not be feasible in the real world? Decent overview of social engineering, worth reading for an intro to the subject.

L’art De La Supercherie by Kevin D. Mitnick (3 star ratings)

There were other words that were not pronounced correctly. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel.

The anecdotes and examples are insightful superxherie ente “The truth is that there is no technology in the world that can prevent a social sjpercherie attack” p Mitnick describes many examples of social engineering; often con-artists that work remotely via phone or internet. This might be an interesting read while considering the message of that last sentence: But anyway, as long as you use a computer, you’ll most likely be fine reading it!

  LEGGIAMO E CONVERSIAMO PDF

This book is not yet featured on Listopia. Thinking back, there have probably been some times where I had been the person on the receiving end.

It really opened my eyes to the power of social engineering and made me see that I was not only prone to being a victim, but a perpertrator of such activity. The authors are trying to separate different stories into different chapters, but the differences between the ideas in these stories are sometimes so small. I especially enjoyed the story about how young Kevin and a friend of his in high school went to a tech convention and managed to thwart a super-secure system in development.

Amanone added it Oct 07, Since his release from federal prison, inMitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Return to Book Page. Social engineering has been going on a long time and has impacted many corporations, governments, etc.

Infamous social engineer Kevin Mitnick takes you through numerous stories of social engineers gaining access to important information using many techniques of deception.

Julia marked it as to-read Feb 14, With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent.