Kevin Mitnick
Author
Pub. Date
2017
Language
English
Formats
Description
Real-world advice on how to be invisible online from "the FBI's most wanted hacker" (Wired).
Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick uses true-life stories...
Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick uses true-life stories...
Author
Language
English
Description
"Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using...
Author
Language
English
Formats
Description
Kevin Mitnick is one of the world's foremost computer hackers. He infiltrated some of the most complicated and advanced computer systems before the law finally caught up with him. Here, Mitnick chronicles his three years on the run from the FBI, during which he worked odd jobs, kept tabs on his pursuers, and continued to hack into systems throughout the world.
Author
Pub. Date
[2002]
Language
English
Description
In his worldwide bestseller Secrets and Lies, Bruce Schneier made the case that achieving successful computer security is about more than just hardware and software, it's people. Truly, the greatest vulnerability in protecting the business assets of any company often lies with the company's own employees. Although corporations go to great lengths to install state of the art systems, they continue to ignore the human element of information security....
Search Tools Get RSS Feed Email this Search