Book Finder
    
 
> Computers & Internet > Digital Business & Culture > Hackers
 

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
William L. Simon
0471782661
December 2005
Paperback
·
 
From Publishers Weekly
It would be difficult to find an author with more credibility than Mitnick to write about the art of hacking. In 1995, he was arrested for illegal computer snooping, convicted and held without bail for two years before being released in 2002. He clearly inspires unusual fear in the authorities and unusual dedication in the legions of computer security dabblers, legal and otherwise. Renowned for his use of "social engineering," the art of tricking people into revealing secure information such as passwords, Mitnick (The Art of Deception) introduces readers to a fascinating array of pseudonymous hackers. One group of friends bilks Las Vegas casinos out of more than a million dollars by mastering the patterns inherent in slot machines; another fellow, less fortunate, gets mixed up with a presumed al-Qaeda–style...


A Pocket Style Manual
Diana Hacker
0312406843
Jan 2004
Paperback
·
 


The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
Kevin D. Mitnick
0764569597
February 2005
Hardcover
·
 
From Publishers Weekly
It would be difficult to find an author with more credibility than Mitnick to write about the art of hacking. In 1995, he was arrested for illegal computer snooping, convicted and held without bail for two years before being released in 2002. He clearly inspires unusual fear in the authorities and unusual dedication in the legions of computer security dabblers, legal and otherwise. Renowned for his use of "social engineering," the art of tricking people into revealing secure information such as passwords, Mitnick (The Art of Deception) introduces readers to a fascinating array of pseudonymous hackers. One group of friends bilks Las Vegas casinos out of more than a million dollars by mastering the patterns inherent in slot machines; another fellow, less fortunate, gets mixed up with a presumed al-Qaeda–style...


Hacking: The Art of Exploitation
Jon Erickson
1593270070
October 2003
Paperback
·
 
About.com, November 2003
"This is an excellent book."

Security Forums, January 2004
"the seminal hackers handbook"

See all Editorial Reviews


Off Center
Jacob S. Hacker
0300108702
Oct 2005
Hardcover
·
 
From Publishers Weekly
One of the mysteries of contemporary American politics is how, in the wake of triangulating Democrats, a small base of conservative Republicans has steered the country so far to the right. In this book, two political science professors from Yale and Berkeley examine ascendant far-right Republicans and offer a sobering analysis of their strategies, many of which, the authors argue, have weakened the ordinary voter's power to "ensure that American politics remains on center." Closely-argued and very readable, the book never sinks under the weight of its details; the authors use an ironic list of rules like "Don't Just Do Something, Stand There" to give chapter and verse on how the ultra-right "hide their radicalism in a thicket of policy detail" and use poll-driven language to sex-up initiatives lacking popular...


Certified Ethical Hacker Exam Prep (Exam Prep 2 (Que Publishing))
Michael Gregg
0789735318
April 7, 2006
Hardcover
·
 
Book Description
The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage you'll need to score higher on the exam.   Along with the most current CEH content, the book also contains the elements that make Exam Preps such strong study aides: comprehensive coverage of exam topics, end-of-chapter review, practice questions, Exam Alerts, Fast Facts, plus an entire practice exam to test your understanding of the material. The book also features MeasureUp's innovative testing software, to help you drill and practice your way to higher scores.

About the...


Gray Hat Hacking: The Ethical Hacker's Handbook
Shon Harris
0072257091
September 2004
Paperback
·
 
Information Security, January 2005
smorgasbord of topics...some deep technical issues...great command of…material...a few refreshingly different topics...deliver[s]...ethical obligations…formidable understanding of…material.

Review
Information Security Magazine : Excerpts from review by Patrick Mueller
... a proficient work...offers a smorgasbord of topics geared towards moderate- and advanced-level practitioners...The authors touch on some deep technical issues, such as automated penetration testing and shellcode exploit construction...great command of the material...[authors] discuss a few refreshingly different topics -- such as vulnerability disclosure protocols -- that are hardly covered elsewhere.

The authors did...deliver on their ethical obligations to...



Devil's Code
John Sandford
0425179885
October 2001
Mass Market Paperback
·
 
From Publishers Weekly
Would that Sandford, creator of the marvelous and bestselling Prey thrillers, had heeded Thomas Wolfe's advice about going home again. Instead, he's resurrected a hero from his previous crime series (The Fool's Run, etc.) in his latest thriller, which begins when the infamous KiddAartist, computer expert and master criminalAis called in to investigate the mysterious death of a former colleague in Texas. Working with the victim's sister, Kidd slowly uncovers a massive computer conspiracy masterminded by St. John Corbeil, the president of a Texas microchip company, whose excesses spiral out of control when the company's product (after gaining a foothold in the world of intelligence) bombs in the commercial marketplace. At first Kidd is inclined to steer clear of the seamier side of the conspiracy, but when several...


A Writer's Reference
Diana Hacker
0312412622
Jan 2003
Paperback
·
 
Book Info
A proven success. The best-selling college textbook of any kind. Thoroughly class tested and enthusiastically endorsed by millions of students and their instructors at more than 1300 colleges and universities across the country. Updated with MLA's 1999 guidelines. Spiral. --This text refers to an out of print or unavailable edition of this title.


The Hanged Man's Song
John Sandford
042519910X
Oct 2004
Paperback
·
 
Book Review
Just about everybody knows John Sandford for his long and successful Prey series. But just as well written and maybe more fun are his Kidd books, of which this is the fourth. Kidd is a professional thief for the Internet age: a cyberprowler, a hacker extraordinaire. In The Hanged Man's Song, he gets word that one of his key contacts--a superhacker known only as Bobby, whom Kidd has never met but has relied on many times--has disappeared. Kidd and an old buddy, both of whom could be compromised by data in Bobby's files, go looking for him. Finding his brutally murdered body draws them into a Hitchcock-esque intrigue that eventually involves stolen government secrets, crooked politicians, and a rogue CIA agent who's as crafty as he is creepy.

While filling his tale with fascinating and authentic-sounding lore about the...



Neuromancer
William Gibson
0441569595
May 1995
Mass Market Paperback
·
 
Book Review
Here is the novel that started it all, launching the cyberpunk generation, and the first novel to win the holy trinity of science fiction: the Hugo Award, the Nebula Award and the Philip K. Dick Award. With Neuromancer, William Gibson introduced the world to cyberspace--and science fiction has never been the same. Case was the hottest computer cowboy cruising the information superhighway--jacking his consciousness into cyberspace, soaring through tactile lattices of data and logic, rustling encoded secrets for anyone with the money to buy his skills. Then he double-crossed the wrong people, who caught up with him in a big way--and burned the talent out of his brain, micron by micron. Banished from cyberspace, trapped in the meat of his physical body, Case courted death in the high-tech underworld. Until a shadowy...


Hackers: Heroes of the Computer Revolution
Steven Levy
0141000511
January 2001
Paperback
·
 
Book Review
Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to the mid-1980s. These eccentric characters used the term "hack" to describe a clever way of improving the electronic system that ran their massive railroad. And as they started designing clever ways to improve computer systems, "hack" moved over with them. These maverick characters were often fanatics who did not always restrict themselves to the letter of the law and who devoted themselves to what became known as "The Hacker Ethic." The book traces the...


Catch Them Being Good
Tony Dicicco
0142003352
Aug 2003
Paperback
·
 
From Booklist
DiCicco coached the U.S. Women's National Soccer Team to victory in the 1996 Olympic Games in Atlanta. Hacker is a psychology consultant for the team. They join their expertise in this accessible, useful guide for coaches at all levels. Primarily written in DiCicco's enthusiastic voice that's straight off the sports field, the book's practical advice includes insight on coaching girls and women (forget the outdated intimidation tactics used by many famous coaches for men); forming a team, making cuts and nurturing exceptional players; criticizing and motivating effectively; working with parents; and evaluating one's own coaching performance. Throughout, Hacker offers clear, helpful ideas for team-building exercises, while DiCicco follows with companion training workouts. Most of the examples focus on soccer, but coaches...


The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick
076454280X
October 2003
Paperback
·
 
Amazon.co.uk
The Art of Deception is about gaining someone's trust by lying to them and then abusing that trust for fun and profit. Hackers use the euphemism "social engineering" and hacker-guru Kevin Mitnick examines many example scenarios.

After Mitnick's first dozen examples anyone responsible for organizational security is going to lose the will to live. It's been said before, but people and security are antithetical. Organizations exist to provide a good or service and want helpful, friendly employees to promote the good or service. People are social animals who want to be liked. Controlling the human aspects of security means denying someone something. This circle can't be squared.

Considering Mitnick's reputation as a hacker guru, it's ironic that the last point of attack for hackers using social engineering are computers....



Hackers & Painters
Paul Graham
0596006624
May 2004
Hardcover
·
 
Book Description
"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care? Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias,...


Empress File
John Sandford
0425135020
May 2001
Mass Market Paperback
·
 
From Publishers Weekly
Camp's witty, engrossing sequel to The Fool's Run brings back artist/narrator Kidd, who makes the most of his skills as a kind of computer-mercenary. A beautiful black activist wants Kidd to help her oust the "respectable" people who are running the small Mississippi delta city of Longstreet, in the process lining their pockets. Kidd and friend/lover/burglar Luellen pose as arty tourists on a houseboat in a plan to flimflam the greedy gang and dig into their hidden bank accounts and stashes of diamonds, stamps, coins, etc. But the caper turns murderous as they run up against a sadistic chief of the department of "animal control." Playing the good guys off the bad, who are led by ditzy, dangerous Mayor Chenille Dessusdelit,sp ok Kidd and Luellen wonder if they'll escape with their skins, and the loot, as events...


A Writer's Reference, Fifth Edition
Diana Hacker
0312397674
October 2002
Plastic Comb
·
 
Book Info
A proven success. The best-selling college textbook of any kind. Thoroughly class tested and enthusiastically endorsed by millions of students and their instructors at more than 1300 colleges and universities across the country. Updated with MLA's 1999 guidelines. Spiral. --This text refers to an out of print or unavailable edition of this title.


Rules for Writers
Diana Hacker
0312406851
Jan 2004
Paperback
·
 


Exploiting Software : How to Break Code
Greg Hoglund, Gary McGraw
0201786958
February 17, 2004
Paperback
·
 
Book Review
Computing hardware would have no value without software; software tells hardware what to do. Software therefore must have special authority within computing systems. All computer security problems stem from that fact, and Exploiting Software: How to Break Code shows you how to design your software so it's as resistant as possible to attack. Sure, everything's phrased in offensive terms (as instructions for the attacker, that is), but this book has at least as much value in showing designers what sorts of attacks their software will face (the book could serve as a checklist for part of a pre-release testing regimen). Plus, the clever reverse-engineering strategies that Greg Hoglund and Gary McGraw teach will be useful in many legitimate software projects. Consider this a recipe book for mayhem, or a compendium of lessons...


The Blue Nowhere
Jeffery Deaver
0671042262
February 2002
Mass Market Paperback
·
 
Book Review
In this 21st century version of the "Gunfight at the O.K. Corral," two computer wizards engage in the kind of high-tech combat that only a hacker could love. Wyatt Gillette, a cybergenius who's never used his phenomenal talent for evil, is sitting in a California jail doing time for a few harmless computer capers when he gets a temporary reprieve--a chance to help the Computer Crimes Unit of the state police nail a cracker (a criminally inclined hacker) called Phate who's using his ingenious program, Trapdoor, to lure innocent victims to their death by infiltrating their computers. Gillette and Phate were once the kings of cyberspace--the Blue Nowhere of the title--but Phate has gone way past the mischievous electronic pranks they once pulled and crossed over to the dark side. While Trapdoor can hack its way into any...


The Blue Nowhere
Jeffery Deaver
0641692722

Hardcover
·
 


The Time Hackers
Gary Paulsen
0385746598
Jan 2005
Hardcover
·
 
From School Library Journal
Grade 4-7 - This fast-paced story talks of far-fetched ideas in seemingly ordinary terms, giving somewhat rational explanations for using laptops to travel through time. Dorso, 12, finds himself the brunt of time-travel-related practical jokes - he discovers dead bodies in his school locker, has a strange encounter with Beethoven, and watches as a woolly mammoth appears out of nowhere and throws his pal Frank across the yard. The boys try to figure out what is going on, and soon realize that the incidents are related to Dorso's laptop. When they start unexpectedly jumping back into history, they encounter two time travelers who are playing games with the historical time line through the use of a special chip implanted in their computers. One man tries to change the past, while the other attempts to stop him....


Hacking for Dummies
Kevin Beaver, Stuart McClure (Foreword)
076455784X
April 30, 2004
Paperback
·
 
Review
“…a good read…a price well-worth paying, because such works are invaluable…” (InfoSecurity News Magazine, August 2004)

“…an excellent aide…” (PC Home, August 2004)

“…should be of interest to both ethical and malicious hackers…” (Publishing News, 22nd March 2004)

Publishing News, 22nd March 2004
"...should be of interest to both ethical and malicious hackers"

See all Editorial Reviews


  ©BookFinder USA LLC.
  All rights reserved.