WorldCat Identities

Mitnick, Kevin D. (Kevin David) 1963-

Overview
Works: 63 works in 169 publications in 9 languages and 9,786 library holdings
Genres: Biography  History  Handbooks, manuals, etc  Miscellanea  Chronology  Military history  Case studies 
Roles: Adapter, Editor
Classifications: QA76.9.A25, 005.8
Publication Timeline
Key
Publications about  Kevin D Mitnick Publications about Kevin D Mitnick
Publications by  Kevin D Mitnick Publications by Kevin D Mitnick
Most widely held works about Kevin D Mitnick
 
moreShow More Titles
fewerShow Fewer Titles
Most widely held works by Kevin D Mitnick
The art of deception : controlling the human element of security by Kevin D Mitnick ( Book )
21 editions published between 2001 and 2013 in English and held by 2,337 WorldCat member libraries worldwide
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented. Mitnick also offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security
The art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers by Kevin D Mitnick ( Book )
20 editions published between 2005 and 2013 in English and held by 2,175 WorldCat member libraries worldwide
"Four pals clean up in Vegas with a pocket-sized computer. A bored Canadian teen gains access to the wire transfers section of a major Southern bank. A couple of kids are recruited to hack into Lockheed Martin and the Defense Information System Network by a terrorist with ties to Osama bin Laden." "Kevin Mitnick, whose own exploits have made him a veritable hacker's hero, shares more than a dozen true stories of cyber-invasions - devilishly ingenious, highly effective schemes that kick up your pulse rate even as you marvel at their sheer audacity. Each is followed by Mitnick's expert analysis of how the attack could have been prevented. And he is uniquely qualified to recommend effective security measures. Both a legend in the hacker underworld and a general in the war on cybercrime, Kevin Mitnick holds the one weapon most likely to take down the intruder - intimate knowledge of the hacker's brilliant and tenacious mind."--BOOK JACKET
No tech hacking a guide to social engineering, dumpster diving, and shoulder surfing by Johnny Long ( )
10 editions published between 2007 and 2008 in English and held by 343 WorldCat member libraries worldwide
As the clich reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, my goal has always been the same: extract the informational secrets using any means necessary. After hundreds of jobs, I discovered the secret to bypassing every conceivable high-tech security system. This book reveals those secrets, and as the title suggests, it has nothing to do with high technology. As it turns out, the secret isn't much of a secret at all. Hackers have known about these techniques for years. Presented in a light, accessible style, you'll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks. As you browse this book, you'll hear old familiar terms like "dumpster diving", "social engineering", and "shoulder surfing". Some of these terms have drifted into obscurity to the point of becoming industry folklore; the tactics of the pre-dawn information age. But make no mistake; these and other old-school tactics work with amazing effectiveness today. In fact, there's a very good chance that someone in your organization will fall victim to one or more of these attacks this year. Will they be ready? .Dumpster Diving Be a good sport and don't read the two "D" words written in big bold letters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny). .Tailgating Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows. .Shoulder Surfing If you like having a screen on your laptop so you can see what you're working on, don't read this chapter. .Physical Security Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity? .Social Engineering with Jack Wiles Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security. .Google Hacking A hacker doesn't even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful. .P2P Hacking Let's assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself. .People Watching Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we'll take a look at a few examples of the types of things that draws a no-tech hacker's eye. .Kiosks What happens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash? .Vehicle Surveillance Most people don't realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!
The unknown war ( Visual )
3 editions published between 1994 and 2011 in English and held by 126 WorldCat member libraries worldwide
In 1978, the Soviet Union produced "The Unknown War" as something of a response to the 1973 U.S. series "The World At War" feeling that the latter series shortchanged the role that Russia played in WWII. While not outright propaganda, it is resolutely pro-Soviet, glorifying their soldiers and people. This includes episodes about everyday life for Russians during the war, and how the Soviet government moved their production facilities to Siberia to escape the Nazis (and ended up being the most productive country during the war). Despite plentiful, revelatory unearthed combat footage, it feels rather stodgy, which--given that it was commissioned by the Soviet government--is not all that surprising
Die Kunst der Täuschung : Risikofaktor Mensch by Kevin D Mitnick ( Book )
17 editions published between 2003 and 2013 in 4 languages and held by 119 WorldCat member libraries worldwide
Hauptbeschreibung Kevin Mitnick, einst der meistgesuchte Verbrecher der USA, saß fünf Jahre im Gefängnis, weil er in zahlreiche Netzwerke großer Firmen eingebrochen war. Dabei bediente er sich häufig nicht nur seiner umfassenden technischen Hacker-Kenntnisse, sondern überlistete praktisch jedes Sicherheitssystem, indem er sich Passwörter erschlich, in Mülltonnen nach sicherheitsrelevanten Informationen suchte und falsche Identitäten vorgaukelte. Der legendäre Hacker Kevin Mitnick enthüllt in diesem Buch, wie die größte Schwachstelle in jedem IT-Sicherheitssystem für Angrif
20th century with Mike Wallace chemical and biological weapons ( Visual )
1 edition published in 1996 in English and held by 77 WorldCat member libraries worldwide
Describes history of chemical and biological weapons
Die Kunst des Einbruchs : Risikofaktor IT by Kevin D Mitnick ( Book )
1 edition published in 2008 in German and held by 20 WorldCat member libraries worldwide
Die Kunst des Einbruchs by Kevin D Mitnick ( )
3 editions published between 2012 and 2013 in German and held by 16 WorldCat member libraries worldwide
Hauptbeschreibung Kevin Mitnick, einst der meistgesuchte Verbrecher der USA, saß fünf Jahre im Gefängnis, weil er in zahlreiche Netzwerke großer Firmen eingebrochen war. Heute ist er rehabilitiert, gilt aber nach wie vor weltweit als Prototyp des Hackers. Seit längerer Zeit hat Mitnick in der Hackerszene nach authentischen und spannenden Geschichten gesucht, die auch für Sicherheitsverantwortliche in Firmen hoch-interessante Erkenntnisse abwerfen. Die hier vorliegende Sammlung von Geschichten ist das Ergebnis dieser Suche. ?Tauchen Sie aus der Sicherheit und Geborgenheit Ih
De kunst van het misleiden : de menselijke factor in informatiebeveiliging by Kevin D Mitnick ( Book )
1 edition published in 2003 in Dutch and held by 16 WorldCat member libraries worldwide
L'art de l'intrusion by Kevin D Mitnick ( Book )
2 editions published in 2005 in French and held by 15 WorldCat member libraries worldwide
Les récits d'attaques informatiques réalisées par des pirates piégés par la police contre de grandes sociétés. On y lit à propos de la manière dont le hacker a procédé et son état d'esprit durant la période où il a réalisé l'attaque. Les récits s'accompagnent de conseils pour augmenter la sécurité. Il y a également un chapitre sur les experts en manipulation. [SDM]
Ghost in the wires : my adventures as the world's most wanted hacker by Kevin D Mitnick ( Book )
6 editions published between 2011 and 2012 in English and held by 12 WorldCat member libraries worldwide
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information. Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI's net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down. Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information. - Publisher
Getting here by Kevin D Mitnick ( Book )
1 edition published in 1999 in English and held by 9 WorldCat member libraries worldwide
Hardware hacking have fun while voiding your warranty by Joe Grand ( )
3 editions published in 2004 in English and French and held by 9 WorldCat member libraries worldwide
Includes hacks of most popular gaming systems like Xbox and PS/2. This work teaches readers to unlock the full entertainment potential of their desktop PC. It frees iMac owners to enhance the features they love and get rid of the ones they hate. It is suitable for the beginner hobbyist with no electronics or coding experience
On this date : a day-by-day guide to history by Kevin D Mitnick ( Book )
1 edition published in 2009 in English and held by 7 WorldCat member libraries worldwide
Hardware hacking : have fun while voiding the warranty by Joe Grand ( Book )
1 edition published in 2004 in English and held by 7 WorldCat member libraries worldwide
Provides instructions for upgrading and repairing computer and other electronic equipment, including the PlayStation 2, mobile phones, Palm devices, Macintosh computers, and Ataris
Proposition 13 and the public schools : the first year by David Katz ( Book )
1 edition published in 1979 in English and held by 4 WorldCat member libraries worldwide
El arte de la intrusion : la verdadera historia de las hazañas de hackers, intrusos e impostores by Kevin D Mitnick ( Book )
1 edition published in 2006 in Spanish and held by 3 WorldCat member libraries worldwide
Sztuka podstępu : łamałem ludzi, nie hasła by Kevin D Mitnick ( Book )
2 editions published between 2003 and 2011 in Polish and held by 3 WorldCat member libraries worldwide
Hai ke da pian ju by Kevin D Mitnick ( Book )
1 edition published in 2003 in Chinese and held by 3 WorldCat member libraries worldwide
46th annual Mid-west International Band & Orchestra Clinic by Duncanville High School Wind Ensemble ( Recording )
1 edition published in 1993 and held by 3 WorldCat member libraries worldwide
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.25 (from 0.10 for Tao wang z ... to 0.97 for Propositio ...)
Alternative Names
Case, Thomas, 1963-
Case, Thomas (haker).
Chernoff, Anton.
Chernoff, Anton, 1963-
Condor.
Condor, 1963-
Merrill, Brian.
Merrill, Brian, 1963-
Mitnick, Kevin.
Mitnick, Kevin D.
Mitnick, Kevin David.
N6NHG.
N6NHG, 1963-
Nusbaum, Lee.
Nusbaum, Lee, 1963-
Stanfill, David.
Stanfill, David, 1963-
Weiner, Fred.
Weiner, Fred, 1963-
ミトニック, ケビン
Languages
English (102)
German (13)
French (10)
Chinese (5)
Polish (3)
Japanese (2)
Spanish (2)
Russian (1)
Dutch (1)
Covers