Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and
The first guide to planning and performing a physicalpenetration test on your computer's security Most IT security teams concentrate on keeping networks andsystems safe from attacks from the outside-but what if yourattacker was on the inside? While nearly
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies, and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing
The first two books in this series -Stealing the Network: How to Own the Box- and -Stealing the Network: How to Own a Continent- have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hackin
-Stealing the Network: How to Own the Box- is NOT intended to be a -install, configure, update, troubleshoot, and defend book.- It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented