The Art of Intrusion and over 2 million other books are available for Amazon Kindle . Learn more

Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Image not available

Start reading The Art of Intrusion on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback) - Common [Paperback]

By (author) William L. Simon By (author) Kevin D. Mitnick
4.2 out of 5 stars  See all reviews (11 customer reviews)

Available from these sellers.


Amazon Price New from Used from
Kindle Edition 7.41  
Hardcover 21.00  
Paperback --  
Paperback, 2006 --  

Product details

  • Paperback
  • Publisher: John Wiley & Sons Inc (2006)
  • ASIN: B009CSJ8MM
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (11 customer reviews)
  • See Complete Table of Contents

More About the Authors

Discover books, learn about writers, and more.

Product Description

Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In The Art of Intrusion, Mitnick offers hair-raising stories of real-life computer break-ins, and shows how the victims could have prevented them.

Inside This Book (Learn More)
Browse and search another edition of this book.
First Sentence
There comes a magical gambler's moment when simple thrills magnify to become 3-D fantasies - a moment when greed chews up ethics and the casino system is just another mountain waiting to be conquered. Read the first page
Explore More
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

Most Helpful Customer Reviews
5 of 5 people found the following review helpful
I enjoyed this book. I was very much looking forward to it after reading The Art of Deception. This book follows the same format, with 11 chapters detailing a number of hackers/security consultants experiences breaking into systems in various ways. Unlike the Art of Deception which concentrated purely on social engineering techniques, this book (barring one chapter on social engineering) is largely more technical, detailing hack attacks from information gathering stage through to the hack itself and reporting (if this is done!). A couple of chapters do require technical knowledge, as whilst Mitnick describes a few technical terms, this certainly isn't done comprehensively to allow a novice to fully understand what is going on. As one other reviewer said, Mitnick does intersperse all the 'stories' with experiences from his own life, and whilst this could be construed as egotistical, I found it refreshing and often very funny. Each chapter also details how firms can protect against each attack mentioned, which is very useful, and makes this more than just another hacker culture reference.
Comment | 
Was this review helpful to you?
2 of 2 people found the following review helpful
This book is an amazing insight into the exploits and techniques used

by hackers, crackers and social engineers! it really is a truly gripping read which makes you think "Oh I'll read just one more chapter" I don't think I could pick out any real negative points in the book it was consistent throughout providing not only the great stories of the hacks but also offering some wonderful information,

this really is an absolute MUST for any IT or security fanatic and is well worth the money to add such an excellent book to your shelves!
Comment | 
Was this review helpful to you?
5 of 6 people found the following review helpful
5.0 out of 5 stars This book is made of Win and Good 12 Feb 2006
Format:Hardcover|Verified Purchase
A very interesting collection of stories if you want to look over the shoulders of people who one day may fancy "0wning you". You can get a fell for what they are capable of. Especially regarding patience, single-mindedness and inventiveness in worrying the locks - physical and virtual - until they break. Or in finding that one passage that non-one thought manageable, discoverable or exploitable. Reads like good heist stories without the steamy and ultra-violent parts. And with well-meaning advice to boot.
Some notions of networking required, but neophythes don't need to fear: the authors don't leave you hanging and try to explain the basics - sometimes not too successfully, but then this *is* a hairy subject. Hard-core network admins will not be surprised by anything in here but will get a view of the 'bigger picture' that lies beyond the suspicious activity seen in the log files.
The stories related in the book have, according to the authors, been well-checked an corroborated as explained in the preface. Technically they are absolutely believable.
So what do you get for your money:
Chapter 1: Buy a video poker machine, reverse-engineer it, find out it's predictable then make big bucks in Vegas.
Chapter 2: Try to break into the gov'nmt while being egged on by real (or fake?) Pakistani terrorists.
Chapter 3: Build your own Internet connection from inside prison while running rings around the wardens. The Shawshank Redemption, a bit differently.
Chapter 4: Break into Boeing while there is a computer forensics class in progress. Bad idea!
Chapter 5: The famous Adrian Lamo in action. The New York Times' network is opened up. The Gray Lady then goes into payback mode.
Chapter 6: Your company wants a penetration test?
Read more ›
Comment | 
Was this review helpful to you?
4.0 out of 5 stars Diverse 6 Oct 2013
By Jorden
Format:Hardcover|Verified Purchase
The book has been an extremely interesting read as well as a little bit of a history lesson. Under no circumstances is this an instruction book, but more of a look of where companies went wrong and ways we can all learn to mitigate these risks. Whether you're a professional or someone interested in security then I would happily suggest anyone reads this book.

This book not only looks at the technical challenges but also the physical and social ones; many areas covered.

As a placement student from reading this I have learnt a few things about how I should apply good practices in my work, "No one will go to the trouble of doing that, there is some kid that will.". Overall a good read.
Comment | 
Was this review helpful to you?
5.0 out of 5 stars Fantastic!! 9 Sep 2013
Format:Kindle Edition|Verified Purchase
Could not put this down. I used this book to discover the world of forensics and hacking as this is something I am considering moving to
Comment | 
Was this review helpful to you?
5.0 out of 5 stars IT security classic 13 Aug 2013
Format:Hardcover|Verified Purchase
Although a somewhat old book now at 8 years old, both the author and publication are well known subjects in the security world. No matter your opinion of the author who has collated the stories from various black hat sources (and who himself famously spent time in incarceration prior to this for IT systems penetration) it's worthwhile to read the publication in order to 'know your enemy' as Sun Tzu would have advised.

Since it's a collection of what appear to be true stories of penetrations of organisations systems, it's a welcome break from drier more technical publications that you might be used to as revision reference and similar. The book features less on technical procedures, checklists and exact tools/procedures and facts and more on the process and social engineering behind real world penetration attacks against the IT industry - as such the book ages well and is still insightful despite the age.

It feels like the majority of stories revolve around the attackers finding overlooked small flaws in a sites security, and then spending time turning this single flaw into a larger penetration, growing in depth of compromise over time. This is quite a contrast to the usual mainstream view of a single flaw causing the compromise of an organisation - the book implies that it's more likely a string of flaws, each on its own not a great issue (and probably existing due to lack of staff time or knowledge) but when combined they provide an attacker with a route in.

The story of the attacker who spends a year breaking into a company also challenges the traditional view of attackers that compromise a system, cause damage or send as much spam as possible until detected and then the issue is fixed by the IT staff.
Read more ›
Comment | 
Was this review helpful to you?
Would you like to see more reviews about this item?
Were these reviews helpful?   Let us know

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category