Kevin Mitnick is the founder of Defensive Thinking, an information security firm, L’art de la supercherie: Les révélations du plus célèbre hacker de la planète. Buy L’art de la supercherie by Kevin Mitnick, William-L Simon, Daniel Garance, Raymond Debonne (ISBN: ) from Amazon’s Book Store. Buy L’art de la supercherie by Kevin Mitnick, William-L Simon, Steve Wozniak, Daniel Garance, Raymond Debonne (ISBN: ) from Amazon’s.
|Country:||Bosnia & Herzegovina|
|Published (Last):||1 December 2014|
|PDF File Size:||7.21 Mb|
|ePub File Size:||2.6 Mb|
|Price:||Free* [*Free Regsitration Required]|
If you like books and love to build cool products, we may be looking for you.
L’art De La Supercherie
When I recently had to take an online training class at work about social engineers trying to trick you into giving up valuable proprietary information, there were cute little video segments featuring my old friend Kevin.
Then, you figure out the lingo for asking that type of information. Steven Grabowski marked it as to-read Aug 20, The main point behind this book is still very true today: Cecilia Dunbar Hernandez rated it it was amazing Oct 09, He also echoes Bruce Schneier’s quote: Taking an example from the book. Preview — Hacker’s Box by Kevin D.
L’art De La Supercherie by Kevin D. Mitnick (3 star ratings)
Voir plus de critiques. Now, in The Art of Deception, the world’s most notorious hacker gives new meaning to the old adage, “It takes a thief to catch a thief.
The guide, like all such specifications, is deadly dry and would require several readings and much thought to fully internalize. Description The world’s most infamous hacker offers an insider’s view of the low-tech threats to high-tech security. Want to Read saving…. There are very few cases included here of people working in person; the simplest case involved a man studying a business to find out when the office staff left, and when the janitors arrived.
The most insecure part of a computer system is the people using it, and these stories describe how that aspect can be exploited. The second half contains a set of policies companies should apply in order to prevent the stories of the first half to become a reality. The authors are trying to separate different stories into different chapters, but the differences between the ideas in these stories are sometimes so small.
I remember stumbling onto the “Anarchist Cookbook”, and finding a few issues of the hacker magazine at a Barnes and Noble. If it’s a password, ka secure network, pa a physical lock, they’re all vulnerable to some type of attack.
The Art of Deception Livre audio | Kevin Mitnick |
Now a security consultant, he has spoken to audiences at conventions around the world, been on dozens of major national TV and radio shows, and even testified in front of Congress. I especially enjoyed the story about how young Kevin and a arf of his in high school went to a tech convention and managed to thwart a super-secure system in development.
That’s not to say social engineers have given up and ekvin up their hats, it’s likely more prevalent than ever, but this is the Social Engineering book for people taking the on-ramp to the Information Superhighway for the very first time in the early s. There are entertaining stories throughout the book The Art of Deception is a book written by the notorious hacker of the s Kevin Mitnick who came to fame after a nationwide manhunt ending with his arrest in Jeremy marked it as to-read Feb 11, First, you find out who stores the information about opening new accounts there’s a service that helps banks identify good and bad clients.
Just like any security book, this book can also help the bad guys improve their skills, because it offers many ideas on how you can trick people; however, if the good guys zupercherie the book, they would laugh at the bad guys’ attempts and say “Ha, Mitnico know that one! The book isn’t about Mitnick, though; it’s about social engineering. There are entertaining stories throughout the book that are used to illustrate how social engineering can be used to gain access to information that would be secure if it wasn’t for weaknesses in the human element of the system.
Daniel Fackrell marked it as to-read Jul 23, Oh, and there is some good advice on not downloading unusual email attachments. John marked it as to-read Jan 27, There are no discussion topics on this book yet. Return to Book Page. Trivia About The Art of Decept I loved the real life-stories, but the last chapter, explaining security procedures for companies, was kfvin boring.
All businesses go through difficult times, but how you, as the owner, because doing so models positive ways of handling interactions with clients. To ask other readers questions about Hacker’s Boxplease sign up.
Alex Bakos rated it it was amazing Mar 24, Probably hasn’t aged as well as it could have, but that’s the internet for you. Kevin Mitnick, the world’s most famous former computer hacker, has been the subject of countless news and magazine articles, the idol of thousands of would-be hackers, and a one-time “most wanted” criminal of cyberspace, on the run from the bewildered Feds. Now a security consultant, he has spoken to audiences at conventions around the world, been on dozens kecin major national TV and radio shows, Kevin Mitnick, the world’s most famous former computer hacker, has been the subject of countless news and magazine articles, the idol of thousands of would-be hackers, and a one-time “most wanted” criminal of cyberspace, on the run from the bewildered Feds.
To ask other readers questions about L’art De La Supercherieplease sign up.
Wish I had read this about a decade ago as it has some good common sense knowledge to learn from. Want to Read saving…. Information is solicited under false pretense from various people, then combined to gain further access or the answers.