Enjoy fast, FREE delivery, exclusive deals and award-winning movies & TV shows with Prime
Try Prime
and start saving today with Fast, FREE Delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Instant streaming of thousands of movies and TV episodes with Prime Video
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
$12.79$12.79
FREE delivery: Thursday, July 27 on orders over $25.00 shipped by Amazon.
Ships from: Amazon.com Sold by: Amazon.com
Buy used: $11.77
Other Sellers on Amazon
& FREE Shipping
92% positive over last 12 months
+ $3.99 shipping
82% positive over last 12 months
Usually ships within 4 to 5 days.
+ $3.99 shipping
86% positive over last 12 months
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the Authors
OK
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Paperback – Illustrated, December 27, 2005
Purchase options and add-ons
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:
- A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines
- Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems
- Two convicts who joined forces to become hackers inside a Texas prison
- A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access
- Print length288 pages
- LanguageEnglish
- PublisherWiley
- Publication dateDecember 27, 2005
- Dimensions6 x 1 x 8.9 inches
- ISBN-100471782661
- ISBN-13978-0471782667
The Amazon Book Review
Book recommendations, author interviews, editors' picks, and more. Read it now.
Frequently bought together

What do customers buy after viewing this item?
- Lowest Pricein this set of products
Ghost in the Wires: My Adventures as the World's Most Wanted HackerKevin MitnickPaperback - Most purchasedin this set of products
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in KaliPaperback
Editorial Reviews
Review
It would be difficult to find an author with more credibility than Mitnick to write about the art of hacking. In 1995, he was arrested for illegal computer snooping, convicted and held without bail for two years before being released in 2002. He clearly inspires unusual fear in the authorities and unusual dedication in the legions of computer security dabblers, legal and otherwise. Renowned for his use of "social engineering," the art of tricking people into revealing secure information such as passwords, Mitnick ("The Art of Deception) introduces readers to a fascinating array of pseudonymous hackers. One group of friends bilks Las Vegas casinos out of more than a million dollars by mastering the patterns inherent in slot machines; another fellow, less fortunate, gets mixed up with a presumed al-Qaeda- style terrorist; and a prison convict leverages his computer skills to communicate with the outside world, unbeknownst to his keepers. Mitnick's handling of these engrossing tales is exemplary, for which credit presumably goes to his coauthor, writing pro Simon. Given the complexity (some would say obscurity) of the material, the authors avoid the pitfall of drowning readers in minutiae. Uniformly readable, the stories-- some are quite exciting-- will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry. "Agent, David Fugate. (Mar.) ("Publishers Weekly, February 14, 2005)
Infamous criminal hacker turned computer security consultant Mitnick offers an expert sequel to his best-sellingThe Art of Deception, this time supplying real-life rather than fictionalized stories of contemporary hackers sneaking into corporate servers worldwide. Each chapter begins with a computer crime story that reads like a suspense novel; it is a little unnerving to learn how one's bank account is vulnerable to digital thieves or how hackers with an interest in gambling can rake in thousands of dollars in just minutes at a compromised slot machine. The hack revealed, Mitnick then walks readers step by step through a prevention method. Much like Deception, this book illustrates that hacking techniques can penetrate corporate and government systems protected by state-of-the-art security.
Mitnick's engaging writing style combines intrigue, entertainment, and education. As with Deception, information technology professionals can learn how to detect and prevent security breaches, while informed readers can sit back and enjoy the stories of cybercrime. Recommended for most public and academic libraries. --Joe Accardi, William Rainey Harper Coll. Lib., Palatine, IL ("Library Journal, January 15, 2005)
"Uniformly readable, some quite exciting...will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry." ("Publishers Weekly, February 14, 2005)
..."engaging writing style combines intrigue, entertainment, and education." ("Library Journal, January 15, 2005)
From the Inside Flap
"Enter the hostile world of computer crime from the comfort of your own armchair. Mitnick presents ten compelling chapters, each the result of an interview with a real hacker about a real attack. A must-read for anyone with an interest in information security."
Tom Parker, Computer Security Analyst and founder of Global InterSec LLC
"Each chapter begins with a computer crime story that reads like a suspense novel."
Library Journal
"It would be difficult to find an author with more credibility than Mitnick to write about the art of hacking…. [The Art of Intrusion] introduces readers to a fascinating array of pseudonymous hackers. One group bilks Las Vegas casinos out of more than a million dollars by mastering the patterns inherent in slot machines; another fellow, less fortunate, gets mixed up with a presumed al-Qaeda-style terrorist…. Uniformly readable, the stories … will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry."
Publishers Weekly
When you're a legend among hackers, they tell you their stories
If you're a computer security officer, these tales crawled out of that closet where your nightmares live. Fears about national security keeping you awake? Put the coffee on; it gets worse. And if you just enjoy a darn good real-life spy story, strap yourself in for a wild read.
From the Back Cover
"Enter the hostile world of computer crime from the comfort of your own armchair. Mitnick presents ten compelling chapters, each the result of an interview with a real hacker about a real attack. A must-read for anyone with an interest in information security."
Tom Parker, Computer Security Analyst and founder of Global InterSec LLC
"Each chapter begins with a computer crime story that reads like a suspense novel."
Library Journal
"It would be difficult to find an author with more credibility than Mitnick to write about the art of hacking…. [The Art of Intrusion] introduces readers to a fascinating array of pseudonymous hackers. One group bilks Las Vegas casinos out of more than a million dollars by mastering the patterns inherent in slot machines; another fellow, less fortunate, gets mixed up with a presumed al-Qaeda-style terrorist…. Uniformly readable, the stories … will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry."
Publishers Weekly
When you're a legend among hackers, they tell you their stories
If you're a computer security officer, these tales crawled out of that closet where your nightmares live. Fears about national security keeping you awake? Put the coffee on; it gets worse. And if you just enjoy a darn good real-life spy story, strap yourself in for a wild read.
About the Author
Kevin D. Mitnick, bestselling author of The Art of Deception, may be the most celebrated hacker ever to "go legit" and apply his considerable skills to helping organizations protect themselves from people like himself. Considered an authority on preventing security breaches, he has appeared on Good Morning America, 60 Minutes, and others.
William L. Simon is coauthor of The Art of Deception and the bestseller iCon: Steve Jobs, also published by Wiley.
Product details
- Publisher : Wiley; First Edition (December 27, 2005)
- Language : English
- Paperback : 288 pages
- ISBN-10 : 0471782661
- ISBN-13 : 978-0471782667
- Item Weight : 11.2 ounces
- Dimensions : 6 x 1 x 8.9 inches
- Customer Reviews:
Important information
To report an issue with this product, click here.
About the authors

William L. Simon is the author or co-author of more than 30 books, including numerous New York Times, national, and international bestsellers. Born in Washington, DC, he holds two degrees from Cornell University, and has been a freelance writer ever since -- first as a writer of documentaries, corporate, and informational films, then as a book author. He is a member of the Writers Guild of America, West, and now lives in Los Angeles.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonReviewed in the United States on July 1, 2013
-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
The information contained in the book still carries value, and is an accessible way to introduce people to the necessity of caution and security in all aspects of modern life. The caution is needed for everyone, from the consumer listening to almost daily loss of personal information to the manager charged with securing the company physically and technologically. At worst, you will walk away from this book hopefully thinking a bit more about security, if not starting to feel paranoid. And as technology works its way into every aspect of our lives, caution is needed now more than ever, which is where Mitnick delivers the goods in cautionary tales.
Each chapter is a different case study. And as I read each case, I underlined the technical details used in the story. It wasn't just all about "social engineering (manipulating people into helping you gain access to a network)." There were software techniques (C++ and Visual Basic) and "command line" utilities such as "traceroute." There were references to "ports," such as 53, 25, and 80, and "zone transfers." Another referenced something called "Nmap," and a "Cisco device." Servers and routers were discussed along with "RADIUS" and a "demilitarized zone" and "Transfer Control Protocol." And that's only a sampling of the computer networking stuff. There is also a whole bunch of good junk about telephone networks: switches, PBX and all that jazz - the playground of those pesky phreakers. I mention these things because although you do not necessarily have to be a techno-geek to understand this book, you would be miles ahead of you at least knew a little about communication networks. Put it this way, if you're totally clueless, you probably won't like this book. On the other hand, if you're a novice like me, you'll probably love it. I did.
As a footnote, my favorite was the chapter about how a small group of people actually hacked into the Las Vegas slot machines. And they made money! After I read that story I was hooked and couldn't put the book down.
The book is overall a quick and easy read, and the stories are written with the feel of a crime novel- full of gripping, can't-wait-to-see-what-happens intrigue. The stories cover casinos, prisons, aircraft companies, newspaper companies, banks, medical companies, and so on- indeed, no-one is safe from hacking, no matter how thick and strong of an electronic barrier you may build. Penetration tests and social engineering are also discussed (though not as much as Mitnick's other book The Art of Deception ), which I found to be the most enthralling part of the book. Some hacks may take months or years to pull off, but others can happen by a variety of means in as little as a few days. I can't help but be impressed at the capabilities of motivated people with a little bit of technical know-how, whether they are acting maliciously or not.
I found the book to be both entertaining and technically helpful, and I would recommend it to anyone who uses a computer. This book is not a how-to guide for hacking, so if that is what you are after, I suggest looking elsewhere. The stories presented what happened in the hacks, but not how to do it.
Top reviews from other countries
Great stories on how it is done by them though.














