|
![]() ![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Kevin MitnickPublisher: Little Brown and Company Imprint: Little Brown and Company Edition: Library Edition Dimensions: Width: 16.80cm , Height: 3.00cm , Length: 15.50cm Weight: 0.299kg ISBN: 9781478945536ISBN 10: 1478945532 Publication Date: 14 February 2017 Audience: General/trade , General Format: Audio Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsHow would it feel to find out that your neighbor and friend has secretly observed you in your own home for years? The place that should be most private to you was not, and the intruder's devices themselves weren't something you'd ever have thought to look for. This kind of behavior is the opposite of giving normal people freedom and security, of valuing and respecting them as humans--and it's happening more and more. The answer to peeping eyes and cyber theft is to move society toward greater cyber-security and it all starts with essential education about being private and invisible in our daily lives. Kevin's book is the must read in this new world.-- Steve Wozniak, cofounder, Apple Inc. Intriguing, insightful, and extremely educational..One can learn a great deal about protecting themselves once they understand how another one perpetrates the crime. -- Frank W. Abagnale, author of Catch Me If You Can In a gruff timbre and matter-of-fact tone, narrator Ray Porter walks listeners through the details of avoiding malicious hackers and their related schemes. Porter provides an assertively controlled, well-paced journalistic performance. -- AudioFile A blueprint for system security...Required reading for IT professionals, this book is highly recommended for public, academic, and corporate libraries. -- Library Journal The most famous computer hacker in the world. A tour de force. -- Publishers Weekly Aims to help everyone-from the everyday internet users to the hardcore paranoid-do a better job of keeping personal information private. -- CNET Who better than Mitnick-internationally wanted hacker turned Fortune 500 security consultant-to teach you how to keep your data safe from spear phishing, computer worms, and Fancy Bears? -- Esquire Offers a sobering reminder of how our raw data-from email, cars, home Wi-Fi networks and so on-makes us vulnerable. -- New York Times Book Review Author InformationKevin Mitnick, as the world's most famous hacker, has been the subject of countless news and magazine articles published throughout the world. He has made guest appearances on numerous television and radio programs, offering expert commentary on issues related to information security. His leading penetration-testing team is highly respected and sought after for their security services to the world's top corporations and governments through the company he founded, Mitnick Security Consulting, LLC. His clients include dozens of the Fortune 500 and world governments. He is the author of the New York Times bestseller Ghost in the Wires, as well as several other books. Robert Vamosi is a senior analyst with the Mocana Corporation, a device security start up. He is also a contributing editor at PCWorld and a security blogger for Forbes.com. The author of When Gadgets Betray Us, he lives in California. Ray Porter is an AudioFile Earphones Award-winning narrator and fifteen-year veteran of the Oregon Shakespeare Festival. He has appeared in numerous films and television shows, including Almost Famous, ER, and Frasier. Tab Content 6Author Website:Countries AvailableAll regions |