להקשיב ולקרוא

היכנסו לעולם אינסופי של סיפורים

  • קראו והקשיבו כמה שאתם רוצים
  • למעלה ממיליון כותרים
  • ספרים בלעדיים + Storytel Originals
  • ניתן לבטל מתי שרוצים
להרשמה
Details page - Device banner - 894x1036
Cover for The Art of Deception: Controlling the Human Element of Security

The Art of Deception: Controlling the Human Element of Security

17 דירוגים

4

משך
13 שעות ו-41 דקות
שפה
אנגלית
פורמט
קטגוריה

עיון

Kevin Mitnick's exploits as a cyber-desperado and fugitive have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."

Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Please note: This is a historical recording. The audio quality represents the technology of the time when it was produced.

© 2020 Tantor Media (ספר מוקלט): 9781705259405

תאריך פרסום

ספר מוקלט: 20 ביולי 2020

אחרים גם נהנו...

  1. Social Engineering: The Science of Human Hacking 2nd Edition
    Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  2. Social Engineering: The Art of Human Hacking
    Social Engineering: The Art of Human Hacking Christopher Hadnagy
  3. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
    The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  4. We Have Root: Even More Advice from Schneier on Security
    We Have Root: Even More Advice from Schneier on Security Bruce Schneier
  5. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back
    A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
  6. Hacking the Hacker: Learn From the Experts Who Take Down Hackers
    Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  7. Cryptography: The Key to Digital Security, How It Works, and Why It Matters
    Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  8. Cybersecurity For Dummies
    Cybersecurity For Dummies Joseph Steinberg
  9. Cybersecurity and Cyberwar: What Everyone Needs to Know
    Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  10. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  11. The Digital Silk Road: China's Quest to Wire the World and Win the Future
    The Digital Silk Road: China's Quest to Wire the World and Win the Future Jonathan E. Hillman
  12. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
    Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  13. The Wires of War: Technology and the Global Struggle for Power
    The Wires of War: Technology and the Global Struggle for Power Jacob Helberg
  14. Targeted: The Cambridge Analytica Whistleblower's Inside Story of How Big Data, Trump, and Facebook Broke Democracy and How It Can Happen Again
    Targeted: The Cambridge Analytica Whistleblower's Inside Story of How Big Data, Trump, and Facebook Broke Democracy and How It Can Happen Again Brittany Kaiser
  15. Propaganda
    Propaganda Edward Bernays
  16. What is the Dark Web?: The truth about the hidden part of the internet
    What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  17. Game Theory: Understanding the Mathematics of Life
    Game Theory: Understanding the Mathematics of Life Brian Clegg
  18. Liars and Outliers: Enabling the Trust that Society Needs to Thrive
    Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
  19. Cyber Privacy: Who Has Your Data and Why You Should Care
    Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
  20. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  21. Exploding Data: Reclaiming Our Cyber Security in the Digital Age
    Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  22. Supremacy: Winner of the FT Business Book of the Year 2024
    Supremacy: Winner of the FT Business Book of the Year 2024 Parmy Olson
  23. Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets
    Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Brett Scott
  24. 97 Principles for Software Architects: Axioms for software architecture and development written by industry practitioners
    97 Principles for Software Architects: Axioms for software architecture and development written by industry practitioners Multiple Authors
  25. A Brief History of Intelligence: Evolution, AI, and the Five Breakthroughs That Made Our Brains
    A Brief History of Intelligence: Evolution, AI, and the Five Breakthroughs That Made Our Brains Max S. Bennett
  26. System Error: Where Big Tech Went Wrong and How We Can Reboot
    System Error: Where Big Tech Went Wrong and How We Can Reboot Rob Reich
  27. Dark Data: Why What You Don't Know Matters
    Dark Data: Why What You Don't Know Matters David J. Hand
  28. Viral: The Search for the Origin of Covid-19
    Viral: The Search for the Origin of Covid-19 Matt Ridley
  29. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World
    The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
  30. Cyber Hacking: Wars in Virtual Space
    Cyber Hacking: Wars in Virtual Space Scientific American
  31. Kissinger the Negotiator: Lessons from Dealmaking at the Highest Level
    Kissinger the Negotiator: Lessons from Dealmaking at the Highest Level James K. Sebenius
  32. Viral: The Search for the Origin of Covid-19
    Viral: The Search for the Origin of Covid-19 Matt Ridley
  33. Easy Money: Cryptocurrency, Casino Capitalism, and the Golden Age of Fraud
    Easy Money: Cryptocurrency, Casino Capitalism, and the Golden Age of Fraud Ben McKenzie
  34. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
    Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker Kevin Mitnick
  35. The Money Trap: Grand Fortunes and Lost Illusions Inside the Tech Bubble
    The Money Trap: Grand Fortunes and Lost Illusions Inside the Tech Bubble Alok Sama
  36. Arriving Today: From Factory to Front Door: Why Everything Has Changed About How and What We Buy
    Arriving Today: From Factory to Front Door: Why Everything Has Changed About How and What We Buy Christopher Mims
  37. Big Data: How the Information Revolution Is Transforming Our Lives
    Big Data: How the Information Revolution Is Transforming Our Lives Brian Clegg
  38. The AI Con: How to Fight Big Tech’s Hype and Create the Future We Want
    The AI Con: How to Fight Big Tech’s Hype and Create the Future We Want Emily M. Bender
  39. Contraception: A Concise History
    Contraception: A Concise History Donna J. Drucker
  40. You Will Own Nothing: Your War with a New Financial World Order and How to Fight Back
    You Will Own Nothing: Your War with a New Financial World Order and How to Fight Back Carol Roth
  41. The Infinite Machine: How an Army of Crypto-hackers Is Building the Next Internet with Ethereum
    The Infinite Machine: How an Army of Crypto-hackers Is Building the Next Internet with Ethereum Camila Russo
  42. The Clean Coder: A Code of Conduct for Professional Programmers
    The Clean Coder: A Code of Conduct for Professional Programmers Robert C. Martin
  43. Why We Fight: One Man’s Search for Meaning Inside the Ring
    Why We Fight: One Man’s Search for Meaning Inside the Ring Josh Rosenblatt
  44. Corruptible: Who Gets Power and How It Changes Us
    Corruptible: Who Gets Power and How It Changes Us Brian Klaas
  45. Beyond Bitcoin: Decentralised Finance and the End of Banks
    Beyond Bitcoin: Decentralised Finance and the End of Banks Steven Boykey Sidley
  46. Misbelief: What Makes Rational People Believe Irrational Things
    Misbelief: What Makes Rational People Believe Irrational Things Dan Ariely
  47. Fundamentals of Software Architecture: An Engineering Approach
    Fundamentals of Software Architecture: An Engineering Approach Neal Ford

איזה מינוי מתאים לך?

  • מאות אלפי ספרים

  • מצב ילדים (תוכן שמתאים לקטנטנים)

  • הורדת ספרים לקריאה והאזנה בלי אינטרנט

  • אפשר לבטל בכל עת

הבחירה הכי פופולרית

Unlimited

האזנה וקריאה בלי הגבלה.

49.90 ש"ח /חוֹדֶשׁ
14 ימים ללא תשלום
  • חשבון 1

  • גישה בלתי מוגבלת

  • האזנה וקריאה בלי הגבלה

  • קריאה והאזנה גם בלי אינטרנט

  • אפשר לבטל בכל עת

בחירה

Family

גלו ספרים לכל המשפחה. היכנסו יחד לתוך עולם של סיפורים.

69.90 ש"ח /חוֹדֶשׁ
  • 2 חשבונות

  • גישה בלתי מוגבלת

  • שני חשבונות

  • האזנה וקריאה בלי הגבלה

  • אפשר לבטל בכל עת

נסה עכשיו