The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses …
If you like book The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers here is the list of books you may also like
Buy this book on AmazonSimilar books (20)
-
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
A chilling, globe-spanning detective story, tracking an elite group of Russian hackers and the future of global warfare
Buy this book on Amazon
In 2014, the world witnessed the start of an escalating series of cyberattacks. T… -
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug d…
Buy this book on Amazon -
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network.
Buy this book on Amazon
The word spread through the hacking underground like some unstoppable new virus: an audacious crook had sta… -
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom -- even democracy itself
Buy this book on Amazon
Cult of the Dead Cow is the tale of the oldest, most respected… -
Permanent Record
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system …
Buy this book on Amazon -
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at a uranium enrichment plant in Iran were failing and being replaced at an unprecedented rate. The cau…
Buy this book on Amazon -
Pegasus: How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
Featuring an introduction by Rachel Maddow, Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the behind-the-scenes story of one of the most sophisticated and in…
Buy this book on Amazon -
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highl…
Buy this book on Amazon -
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
There is a Threat Lurking Online with the Power to Destroy Your Finances, Steal Your Personal Data, and Endanger Your Life.
Buy this book on Amazon
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs… -
Hackstory.es: La historia nunca contada del underground hacker en la Península Ibérica
Buy this book on Amazon -
Blue Team Field Manual (BTFM) (Field Manual Series)
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond,…
Buy this book on Amazon -
Where Wizards Stay Up Late: The Origins of the Internet
Twenty five years ago, it didn't exist. Today, twenty million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most t…
Buy this book on Amazon -
-
Dark Wire: The Incredible True Story of the Largest Sting Operation Ever
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have…
Buy this book on Amazon -
The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War
In 2014, Sony Pictures Entertainment was brutally hacked, with thousands of computers wiped and the personal data of hundreds of employees released online. This was the world's first glance at the Laz…
Buy this book on Amazon -
Superintelligence: Paths, Dangers, Strategies
Superintelligence asks the questions: what happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? Nick Bostrom lays the foundation for understanding t…
Buy this book on Amazon -
Reality is Not What it Seems: The Journey to Quantum Gravity
From the best-selling author of Seven Brief Lessons on Physics comes a new book about the mind-bending nature of the universe
Buy this book on Amazon
What are time and space made of? Where does matter come from? And what exa… -
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
Bill is an IT manager at Parts Unlimited. It's Tuesday morning and on his drive into the office, Bill gets a call from the CEO.
Buy this book on Amazon
The company's new IT initiative, code named Phoenix Project, is critical… -
Underground: Tales of hacking, madness, and obsession on the electronic frontier
Libro usado en buenas condiciones, por su antiguedad podria contener señales normales de uso
Buy this book on Amazon -