Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
预算
Plyometrics
Quotable
Eschatology
SPECTROSCOPY
Rima
Cajal
Pumpkins
identit
Pierluigi
GaGa
Panth
Spyness
eXtreme
Vitelliform
harvest
Heresy
Ormiston
Synergies
四六级
Supercharged
Barre
SounSoap
Antigua
Niemiecka
Kerstin
Ennis
新英格兰
Heller
Ehrhard
Integrale
Propellant
KNOCKOUT
Fedele
Readability
Pannyavaro
Unger
Palmiero
thousand
Coopering
哲理
castle
RAFFALLI
BranD
Pads
Nouba
Thumper
Constituting
konstruieren
Quirks
Newest
Security/Hacking Хакеры
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Useful Links
Security/Hacking 欺骗的艺术
Posted on 2010-04-28
|
正如知道Windows的人,都知道比尔·盖兹,如果你对信息安全有所了解,便一定听说过凯文·米特尼克。在信息安全的世界里,他的黑客传奇生涯是无人比拟的。
15岁时闯入“北美空中防务指挥系统”的主机,翻遍了美国指向前苏联及其盟国的所有核弹头的数据资料,然后溜之大吉; 24岁时被DEC指控从公司网络上窃取价值100万美元的软件并造成了400万美元损失,被警察当局认为,只要拥有键盘就会对社会构成威胁; 1994年,成功入侵美国摩托罗拉、NOVELL、SUN、MICROSYSTEMS,芬兰的诺基亚等高科技公司的计算机,FBI推算其盗走的程序和数据而造成的实际损害总额达至4亿美元; 2000年,米特尼克获得监督释放。但不准触摸计算机、手机以及其他任何可以上网的装置; 美国联邦调查局将他列为头号通缉犯、好莱坞根据他的事迹为蓝本拍摄了电影《战争游戏》、以他为主角的书籍更是已经超过10本…… 2002年底,凯文·米特尼克完成出版了《欺骗的艺术》一书,此一上市便成为美国畅销书籍,大获成功。米特尼克也由一个世界著名的黑客成为一名致力于信息安全保护方面的专家。 信息安全已经被全世界所关注,中国也将其提到国家安全的高度。纵然,我国的信息安全技术近年来有了长足的提高进步,但在理念意识上仍然有很大的差距。尤其是凯文·米特尼克在《欺骗的艺术》这本书中详细介绍的社会工程学,仍是许多信息安全工作者们一直以来没有给予重视的非技术类的攻击手段。 本书适于企业、政府的管理人员以及任何缺乏信息安全知识和对信息安全知识有兴趣的人阅读。 在物质产品并不匮乏时,安全意识比安全措施重要的多。――王小瑞
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
Download Link 1 | Alive |
Buy This Book at Best Price >> |
Like this article?! Give us +1: