Start reading The Art of Intrusion on your Kindle in under a minute. Don't have a Kindle? Get your Kindle here or start reading now with a free Kindle Reading App.

Deliver to your Kindle or other device


Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Sorry, this item is not available in
Image not available for
Image not available

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers [Kindle Edition]

William L. Simon , Kevin D. Mitnick
4.2 out of 5 stars  See all reviews (11 customer reviews)

Print List Price: £30.99
Kindle Price: £8.54 includes VAT* & free wireless delivery via Amazon Whispernet
You Save: £22.45 (72%)
* Unlike print books, digital books are subject to VAT.

Free Kindle Reading App Anybody can read Kindle books—even without a Kindle device—with the FREE Kindle app for smartphones, tablets and computers.

To get the free app, enter your e-mail address or mobile phone number.


Amazon Price New from Used from
Kindle Edition £8.54  
Hardcover £24.79  
Paperback --  
Kindle Daily Deal
Kindle Daily Deal: Up to 70% off
Each day we unveil a new book deal at a specially discounted price--for that day only. Learn more about the Kindle Daily Deal or sign up for the Kindle Daily Deal Newsletter to receive free e-mail notifications about each day's deal.

Book Description

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:
  • A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines
  • Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems
  • Two convicts who joined forces to become hackers inside a Texas prison
  • A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access
With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Product Description


"...a valuable investment..." ( AccountingWeb UK, 30 th August 2005)

he retells stories provided by his other hackers of how they managed, often with pitiful ease, to break supposedly secure companies all over the world. (Director, May 2005)

a compilation of real hacking stories told to Mitnick by fellow hackers (, March 2005)

It would be difficult to find an author with more credibility than Mitnick to write about the art of hacking. In 1995, he was arrested for illegal computer snooping, convicted and held without bail for two years before being released in 2002. He clearly inspires unusual fear in the authorities and unusual dedication in the legions of computer security dabblers, legal and otherwise. Renowned for his use of "social engineering," the art of tricking people into revealing secure information such as passwords, Mitnick (The Art of Deception) introduces readers to a fascinating array of pseudonymous hackers. One group of friends bilks Las Vegas casinos out of more than a million dollars by mastering the patterns inherent in slot machines; another fellow, less fortunate, gets mixed up with a presumed al–Qaeda style terrorist; and a prison convict leverages his computer skills to communicate with the outside world, unbeknownst to his keepers. Mitnick′s handling of these engrossing tales is exemplary, for which credit presumably goes to his coauthor, writing pro Simon. Given the complexity (some would say obscurity) of the material, the authors avoid the pitfall of drowning readers in minutiae. Uniformly readable, the stories some are quite exciting will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry. Agent, David Fugate. (Mar.) (Publishers Weekly, February 14, 2005)

Infamous criminal hacker turned computer security consultant Mitnick offers an expert sequel to his best–selling The Art of Deception, this time supplying real–life rather than fictionalized stories of contemporary hackers sneaking into corporate servers worldwide. Each chapter begins with a computer crime story that reads like a suspense novel; it is a little unnerving to learn how one′s bank account is vulnerable to digital thieves or how hackers with an interest in gambling can rake in thousands of dollars in just minutes at a compromised slot machine. The hack revealed, Mitnick then walks readers step by step through a prevention method. Much like Deception, this book illustrates that hacking techniques can penetrate corporate and government systems protected by state–of–the–art security.
Mitnick′s engaging writing style combines intrigue, entertainment, and education. As with Deception, information technology professionals can learn how to detect and prevent security breaches, while informed readers can sit back and enjoy the stories of cybercrime. Recommended for most public and academic libraries. ––Joe Accardi, William Rainey Harper Coll. Lib., Palatine, IL (Library Journal, January 15, 2005)

"...a valuable investment..." ( AccountingWeb UK, 30 th August 2005)

he retells stories provided by his other hackers of how they managed, often with pitiful ease, to break supposedly secure companies all over the world. (Director, May 2005)

a compilation of real hacking stories told to Mitnick by fellow hackers (, March 2005)

"Uniformly readable, some quite exciting...will impart familiar lessons to security pros while introducing lay readers to an enthralling field of inquiry." (Publishers Weekly, February 14, 2005)

"...engaging writing style combines intrigue, entertainment, and education". (Library Journal, January 15, 2005)

From the Inside Flap

Four pals clean up in Vegas with a pocket–sized computer. A bored Canadian teen gains access to the wire transfers section of a major Southern bank. A couple of kids are recruited to hack into Lockheed Martin and the Defense Information System Network by a terrorist with ties to Osama bin Laden.

And these stories are true.

If you′re the security officer in your organization, the tales in this book crawled out of that closet where your nightmares live. Fears about national security keeping you awake? Put the coffee on; it gets worse. And if you just enjoy a heck of a good cliff–hanger full of spies and real–life intrigue, strap yourself in for a wild read.

Product details

  • Format: Kindle Edition
  • File Size: 1426 KB
  • Print Length: 288 pages
  • Publisher: Wiley; 1 edition (17 Mar. 2009)
  • Sold by: Amazon Media EU S.à r.l.
  • Language: English
  • ASIN: B000S1M0DG
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Enhanced Typesetting: Enabled
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (11 customer reviews)
  • Amazon Bestsellers Rank: #133,020 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?

More About the Authors

Discover books, learn about writers, and more.

What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

Most Helpful Customer Reviews
7 of 7 people found the following review helpful
I enjoyed this book. I was very much looking forward to it after reading The Art of Deception. This book follows the same format, with 11 chapters detailing a number of hackers/security consultants experiences breaking into systems in various ways. Unlike the Art of Deception which concentrated purely on social engineering techniques, this book (barring one chapter on social engineering) is largely more technical, detailing hack attacks from information gathering stage through to the hack itself and reporting (if this is done!). A couple of chapters do require technical knowledge, as whilst Mitnick describes a few technical terms, this certainly isn't done comprehensively to allow a novice to fully understand what is going on. As one other reviewer said, Mitnick does intersperse all the 'stories' with experiences from his own life, and whilst this could be construed as egotistical, I found it refreshing and often very funny. Each chapter also details how firms can protect against each attack mentioned, which is very useful, and makes this more than just another hacker culture reference.
Comment | 
Was this review helpful to you?
2 of 2 people found the following review helpful
5.0 out of 5 stars A beautiful Insight Into The Exploits Of Hackers 4 Sept. 2006
This book is an amazing insight into the exploits and techniques used

by hackers, crackers and social engineers! it really is a truly gripping read which makes you think "Oh I'll read just one more chapter" I don't think I could pick out any real negative points in the book it was consistent throughout providing not only the great stories of the hacks but also offering some wonderful information,

this really is an absolute MUST for any IT or security fanatic and is well worth the money to add such an excellent book to your shelves!
Comment | 
Was this review helpful to you?
6 of 7 people found the following review helpful
5.0 out of 5 stars This book is made of Win and Good 12 Feb. 2006
Format:Hardcover|Verified Purchase
A very interesting collection of stories if you want to look over the shoulders of people who one day may fancy "0wning you". You can get a fell for what they are capable of. Especially regarding patience, single-mindedness and inventiveness in worrying the locks - physical and virtual - until they break. Or in finding that one passage that non-one thought manageable, discoverable or exploitable. Reads like good heist stories without the steamy and ultra-violent parts. And with well-meaning advice to boot.
Some notions of networking required, but neophythes don't need to fear: the authors don't leave you hanging and try to explain the basics - sometimes not too successfully, but then this *is* a hairy subject. Hard-core network admins will not be surprised by anything in here but will get a view of the 'bigger picture' that lies beyond the suspicious activity seen in the log files.
The stories related in the book have, according to the authors, been well-checked an corroborated as explained in the preface. Technically they are absolutely believable.
So what do you get for your money:
Chapter 1: Buy a video poker machine, reverse-engineer it, find out it's predictable then make big bucks in Vegas.
Chapter 2: Try to break into the gov'nmt while being egged on by real (or fake?) Pakistani terrorists.
Chapter 3: Build your own Internet connection from inside prison while running rings around the wardens. The Shawshank Redemption, a bit differently.
Chapter 4: Break into Boeing while there is a computer forensics class in progress. Bad idea!
Chapter 5: The famous Adrian Lamo in action. The New York Times' network is opened up. The Gray Lady then goes into payback mode.
Chapter 6: Your company wants a penetration test?
Read more ›
Comment | 
Was this review helpful to you?
5.0 out of 5 stars IT security classic 13 Aug. 2013
Format:Hardcover|Verified Purchase
Although a somewhat old book now at 8 years old, both the author and publication are well known subjects in the security world. No matter your opinion of the author who has collated the stories from various black hat sources (and who himself famously spent time in incarceration prior to this for IT systems penetration) it's worthwhile to read the publication in order to 'know your enemy' as Sun Tzu would have advised.

Since it's a collection of what appear to be true stories of penetrations of organisations systems, it's a welcome break from drier more technical publications that you might be used to as revision reference and similar. The book features less on technical procedures, checklists and exact tools/procedures and facts and more on the process and social engineering behind real world penetration attacks against the IT industry - as such the book ages well and is still insightful despite the age.

It feels like the majority of stories revolve around the attackers finding overlooked small flaws in a sites security, and then spending time turning this single flaw into a larger penetration, growing in depth of compromise over time. This is quite a contrast to the usual mainstream view of a single flaw causing the compromise of an organisation - the book implies that it's more likely a string of flaws, each on its own not a great issue (and probably existing due to lack of staff time or knowledge) but when combined they provide an attacker with a route in.

The story of the attacker who spends a year breaking into a company also challenges the traditional view of attackers that compromise a system, cause damage or send as much spam as possible until detected and then the issue is fixed by the IT staff.
Read more ›
Comment | 
Was this review helpful to you?
Would you like to see more reviews about this item?
Were these reviews helpful?   Let us know
Most Recent Customer Reviews
4.0 out of 5 stars Diverse
The book has been an extremely interesting read as well as a little bit of a history lesson. Under no circumstances is this an instruction book, but more of a look of where... Read more
Published 22 months ago by Jorden
5.0 out of 5 stars Fantastic!!
Could not put this down. I used this book to discover the world of forensics and hacking as this is something I am considering moving to
Published 23 months ago by Firas Ajjuri
2.0 out of 5 stars Enjoyable walk on the dark side
A number of interesting real-life stories.
Worrying thing is how naïve the 'stars' of the chapters are. Read more
Published on 11 April 2013 by SDI
5.0 out of 5 stars MMMMMMM
A concern overall is whether this is really a tongue in cheek guide for the "on the fringe" hacker, and rather than looking in deep dark chat rooms can find all they need here to... Read more
Published on 26 Feb. 2012 by Livvy
4.0 out of 5 stars Interesting and amusing
In the same writing style as The Art of Deception: Controlling the Human Element of Security, Kevin Mitnick gives us more stories which show the workings of a hacker's mind. Read more
Published on 24 Oct. 2011 by gamblor
4.0 out of 5 stars Amazing tales of indiscretion
Mitnick and Simon present a cogent and interesting account of people who have illegally intruded on cyberspace, mainly in the US. Read more
Published on 14 July 2005 by R.K.RAGHAVAN
3.0 out of 5 stars Good stories
The stories in this book are really interesting and the lessons learned very useful. But the writting style leave a lot to be desired. Read more
Published on 19 May 2005 by "wombatboy1975"
Search Customer Reviews
Only search this product's reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category