Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data. Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge-and he teaches you "the art of invisibility." Mitnick is the world's most famous-and formerly the Most Wanted-computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In The Art of Invisibility Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes-privacy is a power you deserve and need in this modern age.
Click the Download button to download a copy of the MARC file.
Enter your FTP details below to send the MARC export file via FTP.
by Kevin Peraino
by Robert Conroy
by Robert Bucholz
by Robert Greenberg
by Arthur Benjamin, Michael Shermer
by Laird Close
by Larry D. Rosen, Ph.D., Adam Gazzaley
by P.W. Singer, Emerson Brooking
by John Medina
"Kevin Mitnick, the world's most famous and infamous hacker, uses many real-life case studies to explain how to to achieve greater online privacy. In a gruff timbre and matter-of-fact tone, narrator Ray Porter walks listeners through the details of avoiding malicious hackers and their related schemes. Porter provides an assertively controlled, well-paced journalistic performance. Disappointingly, though, Mitnick's suggestions range from the easy to grasp, such as employing stronger passwords, to the arcane, such as using dual and tertiary identity verification. The audiobook is eye-opening and scary. It's likely to fascinate, but listeners may finish it without a clear idea of how to go about improving their everyday cybersecurity. W.A.G.. © AudioFile 2017, Portland, Maine"
Sign up for our email newsletter