Syndetics cover image
Image from Syndetics

Ghost in the wires : my adventures as the world's most wanted hacker / Kevin Mitnick with William L. Simon.

By: Contributor(s): Material type: TextTextPublication details: New York : Little, Brown and Company, 2011.Edition: 1st edDescription: xiv, 413 p., [8] p. of plates : ill. ; 25 cmISBN:
  • 0316037702
  • 9780316037709
Subject(s):
Contents:
pt. 1. The making of a hacker. Rough start ; Just visiting ; Original sin ; Escape artist ; All your phone lines belong to me ; Will hack for love ; Hitched in haste ; Lex Luthor ; The Kevin Mitnick discount plan ; Mystery hacker -- pt. 2. Eric. Foul play ; You can never hide ; The wiretapper ; You tap me, I tap you ; "How the fuck did you get that?" ; Crashing Eric's private party ; Pulling back the curtain ; Traffic analysis ; Revelations ; Reverse sting ; Cat and mouse ; Detective work ; Raided ; Vanishing act -- pt. 3. On the run. Harry Houdini ; Private investigator ; Here comes the sun ; Trophy hunter ; Departure ; Blindsided ; Eyes in the sky ; Sleepless in Seattle -- pt. 4. An end and a beginning. Hacking the samurai ; Hiding in the Bible Belt ; Game over ; An FBI valentine ; Winning the scapegoat sweepstakes ; Aftermath : a reversal of fortune.
Summary: Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information. Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI's net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down. Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information. - Publisher.
Fiction notes: Click to open in new window
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode Item holds
Adult Book Adult Book Main Library Biography Mitnick, K. M684 Available 33111006713883
Total holds: 0

Enhanced descriptions from Syndetics:

In this "intriguing, insightful and extremely educational" novel, the world's most famous hacker teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data (Frank W. Abagnale).

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated through false identities, a host of cities, and plenty of close shaves, to an ultimate showdown with the Feds, who would stop at nothing to bring him down.

Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escapes -- and a portrait of a visionary who forced the authorities to rethink the way they pursued him, and forced companies to rethink the way they protect their most sensitive information.

"Mitnick manages to make breaking computer code sound as action-packed as robbing a bank." -- NPR

Includes index.

pt. 1. The making of a hacker. Rough start ; Just visiting ; Original sin ; Escape artist ; All your phone lines belong to me ; Will hack for love ; Hitched in haste ; Lex Luthor ; The Kevin Mitnick discount plan ; Mystery hacker -- pt. 2. Eric. Foul play ; You can never hide ; The wiretapper ; You tap me, I tap you ; "How the fuck did you get that?" ; Crashing Eric's private party ; Pulling back the curtain ; Traffic analysis ; Revelations ; Reverse sting ; Cat and mouse ; Detective work ; Raided ; Vanishing act -- pt. 3. On the run. Harry Houdini ; Private investigator ; Here comes the sun ; Trophy hunter ; Departure ; Blindsided ; Eyes in the sky ; Sleepless in Seattle -- pt. 4. An end and a beginning. Hacking the samurai ; Hiding in the Bible Belt ; Game over ; An FBI valentine ; Winning the scapegoat sweepstakes ; Aftermath : a reversal of fortune.

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information. Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI's net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down. Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information. - Publisher.

Powered by Koha