The Fugitive Game: Online With Kevin Mitnick
Jonathan Littman, The Fugitive Game: Online With Kevin Mitnick
Little Brown Co | 1996 | ISBN: 0316528587, 0316528692 | 383 pages | File type: PDF | 2,5 mb
Provides a definitive study of the criminal career of Kevin Mitnick, a computer hacker and infamous cyberthief, and the high-tech pursuit to bring him to justice. 75,000 first printing. $75,000 ad/promo.
Jonathan Littman takes us into the mind of Kevin Mitnick, cyberspace's most wanted hacker. Drawing on over fifty hours of phone conversations with Mitnick on the run, Littman reveals Mitnick's double life; his narrow escapes; his new identities; his mastery of social engineering; his obsession with revenge. The electronic adventure story that emerges reads like a spy thriller, but also raises questions about Internet security and tensions between constitutional rights of privacy and law enforcement. A good companion piece to the other side of the story, Tsutomu Shimomura's book Takedown.
The Fugitive Game introduces Kevin Mitnick moments before the fugitive hacker surrenders himself to FBI agents who have located him with the help of the so-called cybersleuth, Tsutomu Shimomura. The prologue to Jonathan Littman's book kicks off with the epic climax that came to tantalize movie producers and video game designers and launch magazine covers worldwide. However, this is not another version of Takedown. The Fugitive Game is a compelling, journalistic look at the events that led up to the capture of Kevin Mitnick, and no portion of the folklore surrounding the case is left untouched by the book's critical eye. The real gold of this volume comes from the nearly 200 pages of conversations with Kevin Mitnick himself, most of which were transcribed while he was fleeing from the law.
Over the course of Mitnick's flight from justice, Littman documents and examines the public transformation of Mitnick into Public Enemy Number One, mostly through the efforts of the New York Times writer John Markoff. Markoff's involvement in the eventual capture of Mitnick by Shimomura is also scrutinized at length. Littman even questions the now-legendary Christmas Day break-in of Shimomura's computer, citing reports that the IP spoofing technique, which Markoff claimed was so ingenious, was in fact a well-known method of gaining access to systems for years. This is a brilliant look at a compelling individual and also the manufacturing of media events and the inept efforts of law enforcement to prepare for the next wave of high-tech crime.
Statistical Methods in Counterterrorism
SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide
Foundations and Practice of Security
The Values-based Safety Process
Guarding Your Business: A Management Approach to Security
QuickBooks Online For Dummies
Applied Mathematics for Database Professionals
IFCI's Studies in Cybercrime: The Great SONY Hack of 2014
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Malware, Rootkits & Botnets A Beginner's G(2213)
The Dark Net Searching: how to search anon(2132)
Tor and The Dark Net: Remain Anonymous Onl(1978)
Tor Browser: The Ultimate Guide To The Tor(1953)
Hacking Made Easy: Hack Your Way Through L(1887)
Cybersecurity for Beginners(1690)
Hacking Google Maps and Google Earth(1676)
Hacking For Dummies(1520)
Computer Virus: Introducing... Computer Vi(1508)
Penetration Testing with Raspberry Pi(1495)
The Artificial Intelligence Conspiracy: Ho(1483)
Principles of Computer Security Lab Manual(1467)
Understanding SSL: Securing Your Website T(1449)
Cyber Security Basics: Protect your organi(1416)
Learning Network Forensics(1413)