Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and
There was a time, not too long ago, when the typewriter and notebook ruled, and the computer as an everyday tool was simply a vision. Revolution in the Valley traces this vision back to its earliest roots: the hallways and backrooms of Apple, where the gr
"iWoz traces the life and times of a brilliant, gifted... individual whose contributions to the scientific, business and cultural realms are extensive."—BookpageBefore slim laptops that fit into briefcases, computers looked like strange, alien vending m
This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is
The first guide to planning and performing a physicalpenetration test on your computer's security Most IT security teams concentrate on keeping networks andsystems safe from attacks from the outside-but what if yourattacker was on the inside? While nearly
John Edward, Suzane Northrup, and George Anderson are just a few of the prominent American mediums who have been accused of being frauds. But what if a respected scientist challenged them to make contact with the beyond under controlled laboratory conditi
iCon takes a look at the most astounding figure in a business era noted for its mavericks, oddballs, and iconoclasts. Drawing on a wide range of sources, Jeffrey Young and William Simon provide new perspectives on the legendary creation of Apple, detail J
The firsthand account of the trials and tribulations of engineering one of the most complex pieces of space technology, the Mars Rover Curiosity, by its chief engineer Rob ManningIn the course of our enduring quest for knowledge about ourselves and our un