Acheter d'occasion
EUR 24,66
+ EUR 2,99 (livraison)
D'occasion: Très bon | Détails
Vendu par Nearfine
État: D'occasion: Très bon
Commentaire: Petites traces d'usage. Livraison prévue sous 20 jours.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

Ghost in the Wires: My Adventures As the World's Most Wanted Hacker (Anglais) CD – Livre audio, 15 août 2011

4.3 étoiles sur 5 4 commentaires client

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 49,67 EUR 21,49
CD, Livre audio, 15 août 2011
EUR 28,62 EUR 24,66
--Ce texte fait référence à une édition épuisée ou non disponible de ce titre.
click to open popover

Offres spéciales et liens associés

Descriptions du produit

Revue de presse


"Mitnick manages to make breaking computer code sound as action-packed as robbing a bank."―Rachel Syme, National Public Radio

"Ghost in the Wires reads like a contemporary über-geeky thriller.... For those interested in computer history, Ghost in the Wires is a nostalgia trip to the quaint old days before hacking (and hackers) turned so malicious and financially motivated."―J.D. Biersdorfer, New York Times Book Review

"Intriguing, insightful and extremely educational into the mind of one who truly mastered the art of social engineering with the use of a computer and modern day technologies. I strongly believe that one can learn a great deal about protecting themselves once they understand how another one perpetrates the crime."―Frank W. Abagnale, author of Catch Me if You Can

"A gripping story.... Fascinating and filled with insights."―Jesse Singal, Boston Globe

"Reads like those of Frank Abagnale Jr. and Steven Jay Russell. But Mitnick's has a high-tech twist."―Booklist (starred review)

"It's the piquant human element that really animates this rollicking memoir of high-tech skullduggery....Mitnick's hacking narratives are lucid to neophytes and catnip to people who love code, but the book's heart is his 'social engineering' - his preternatural ability to schmooze and manipulate.....[a] nonstop caper."―Publishers Weekly

"Years ago, I helped put Kevin Mitnick in jail. I now see this made about as much sense as arresting Dean Martin for public drunkenness. Neither of them could stop themselves. Neither was doing any real harm. And, in both cases, watching them struggle with their obsessions was hugely entertaining. Kevin's book is certainly that. Terse and snappy, it reads like Raymond Chandler and provides detailed insight into a time in computer history that already seems quaint. Kevin Mitnick was and is a true Internet pioneer."―John Perry Barlow, cofounder of the Electronic Frontier Foundation --Ce texte fait référence à une édition épuisée ou non disponible de ce titre.

Présentation de l'éditeur

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.

Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI's net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down.

Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information. --Ce texte fait référence à une édition épuisée ou non disponible de ce titre.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Détails sur le produit

Commentaires en ligne

4.3 étoiles sur 5
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile
Voir les 4 commentaires client
Partagez votre opinion avec les autres clients

Meilleurs commentaires des clients

Format: Relié
J'ai dévoré (assez) rapidement ce livre ! Là où les deux précédents ne sont que des recueils d'histoires courtes suivies de conseils, celui-ci lie les histoires, d'une part grâce à l'ordre chronologique (il s'agit après tout d'une autobiographie), mais aussi grâce au recul du Kevin Mitnick d'aujourd'hui, qui n'a pas peur de dire qu'à un instant ou à un autre, il a fait une erreur.

Si vous n'êtes pas technophile ou informaticien de formation, ce livre est quand même accessible : les auteurs ont pris soin d'expliquer simplement certains termes ou de simplifier certains détails, sans que cela en enlève au charme des histoires. Du coup, même si votre anglais (en particulier l'anglais technique lié aux télécommunications) est un peu rouillé, c'est un ouvrage accessible, et vous pourrez profiter d'une histoire de chasse à l'homme tout bonnement surprenante !

Cette simplification peut s'avérer frustrante dans le dernier tiers ou quart du livre pour les technophiles, si comme moi vous espériez de nombreux détails sur certains évènements. Le livre est complété par quelques photos en son milieu, qui sont assez jolies dans l'ensemble.
Remarque sur ce commentaire Une personne a trouvé cela utile. Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus
Format: Broché Achat vérifié
Livre en anglais, mais je le savais en achetant. Plutot facile à lire mis à part quelques termes techniques.

L'histoire est plutot sympa même si l'auteur fait preuve d'un égocentrisme insupportable : "tout petit déjà, j'étais plus intelligent que la moyenne"...

Côté livraison / prix / état du livre, vous pouvez y aller les yeux fermés !
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus
Format: Relié Achat vérifié
I have finished this book much earlier than I expected, it definitely grabs your attention. It seems crazy that some people can go that far into the virtual world.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus
Format: Broché Achat vérifié
manque un peu d'originalité. quand on a lu les autres ouvrages de Mitnick on a peu l'impression de lire la même chose...
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus

Commentaires client les plus utiles sur (beta) 4.6 étoiles sur 5 680 commentaires
137 internautes sur 150 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 400 pages gone in two evenings. 9 août 2011
Par Aaron J. Maynard - Publié sur
Format: Relié Achat vérifié
If I wouldn't have started to halucinate at 2am from being so tired after reading for 8 hours, I would have read this entire book through in one sitting. The book isn't overly technical yet is a huge eye opener for anyone who isn't intimately familiar with the details of Kevin Mitnick as the most wanted hacker of the 90's. If you have a moderate interest in computing, you'll encounter many jaw dropping moments in reaction to the clever, often brazen and sometimes paranoid escapades captured in the book. Towards the 3/4 mark in the book, the story gets a bit drawn out, but was completely well worth the read.
98 internautes sur 112 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Old Game, New Tools 2 août 2011
Par takingadayoff - Publié sur
Format: Relié
When it comes to true crime, I'm pretty squeamish. Nothing violent, please. Clever and devious are what I'm looking for. Frank Abagnale's Catch Me If You Can: The True Story of a Real Fake is one of the best, and it's hard not to compare any subsequent caper story with it.

Ghost in the Wires doesn't reach the level of audacity of Catch Me if You Can - impersonating technicians over the phone doesn't rise to the sheer nerve of a teenager impersonating an airline pilot or a doctor, as Abagnale did, and getting away with it. But Ghost in the Wires goes well beyond the adolescent bragfest of phone hacks that it could have been.

I think this is largely due to the co-writer, William L. Simon. Kevin Mitnick describes in his acknowledgments, how he and Simon argued over how detailed and technical the book should be, and apparently Simon prevailed. There's enough detail to explain how the scams were possible, but not so specific as to send the non-programmer into a hexadecimal stupor.

Another big plus is that many of the hacks depended as much on what Mitnick calls "social engineering" as on specialist knowledge. Unlike the stereotypical computer nerd, Mitnick was as comfortable and proficient at schmoozing people as he was writing code - he could talk his way into places that were restricted and convince people he was entitled to classified information. These were scams anyone can understand.

Mitnick also succeeds at not crossing the line from confident to insufferable, which is another pitfall of true crime tell-alls. Perhaps we can once again thank William Simon for this achievement.

I expected to skim this 400-page book but ended up reading every word. Mitnick was unbelievably audacious, and he says he never profited from his exploits. Knowing the risks (especially after he had already spent an unpleasant stretch in jail), how could he continue to risk getting caught again? He claims he was addicted to hacking, and while that seemed to me a sorry excuse for criminal behavior, it started to seem like the only possible explanation.

Whatever Mitnick's reasons, Ghost in the Wires is as much fun to read as any summer thriller.
52 internautes sur 63 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 The Highest Adventure Possible for any Security Professional 15 août 2011
Par AirDisa - Publié sur
Format: Format Kindle Achat vérifié
A fascination with hacking goes back pretty far for me (I'm an old bat). I loved my experiences reading about Kevin Mitnick, even when he made the papers while on the go. The papers were full of hyperbole even then. I knew to reserve my excitement and hold out for Kevin's own words. My patience is rewarded with this book.

I can't help but enjoy reading about someone who has the adept social engineering of a film noir gumshoe, or the undercover detective, who applied it growing up and getting into trouble. Like Kevin, I knew The Three Days of the Condor. I learned it was a favorite of his, and I clung to this fact which fell through the sieve of newspaper myth. Free Kevin!

Now read Kevin's story, where you'll find enough detail to keep any heart racing. Whether or not you have enough awareness for some of the bits, or rely on the plain language, the story can strike sheer terror in the hearts of those who don't know much of anything about bits and bytes. For those who do, this book contains updated method nomenclature and references to security protocol that it's valuable from that perspective.

Kevin possesses the kind of curiosity to dig and uncover gems of hidden info for esoteric purposes in order to unlock a power only a successful hacker knows about. Social engineering is akin to the confidence game, but different all the same when it involves computer networks. The best hackers are never caught, never known about. Kevin has a different distinction: The first and the grandest adventure story, ever.

You don't need to be a hacker or security professional to appreciate and learn from it. Today, security is serious business and hackers typically have bad or misguided intent. Kevin's motivation was harmless fun at the expense of a system, and honest curiosity which was not rewarded with a government security detail. Fear prevailed then, as hacking was an unknown phenomenon. An innocent motive seemed totally suspect in a court setting.

One frequent result of being a trail blazer is its potential costs. When playing around with the law, this can end in time set aside from society. The NYTimes columnist ironically exercised his own opportunistic free market exploit to establish a mythology around Kevin that ruined any chance for freedom. Kevin emerged from lock down to write the correction that I hold in my hands. The highest adventure possible for any security professional.
171 internautes sur 219 ont trouvé ce commentaire utile 
2.0 étoiles sur 5 This Book Really Bothers Me - Mitnick Is Talented, But He Can't Have It Both Ways 30 décembre 2011
Par D. Scott - Publié sur
Format: Relié
I know that many people love Ghost in the Wires, but this book really bothers me. It's very difficult to be sympathetic towards Kevin Mitnick, who continually prevails upon his readers to let him have it both ways.

I will leave whatever social sickness the brilliant Kevin Mitnick has to the mental health professionals, but suffice it to say that his writing in Ghost in the Wires is a terrific nonfiction example of an "unreliable narrator." Throughout the book, Mitnick does the same things over and over again and is surprised when he repeatedly gets caught. He hurts his mother, grandmother, wife, and friends over and over again with his illegal hacking activities, says he regrets doing it each time, but then turns around and does it to them again. Mitnick is upset when he is blamed for things he "didn't do" and when he is "double crossed," but he freely admits to dozens of other computer break ins and instances where he compromises the trust of others using "social engineering" techniques, ridicules them for trusting him, and then betrays that trust. Mitnick says he never took money from hacking, but now of course he's making money from writing this and other books as well as from promoting his computer security company based on his (illegally obtained) skills. Mitnick is all over the place.

In one scene Mitnick is severely critical of prosecutors who use "dirty tactics" to put him behind bars, but then he continues to use his own dirty tactics while behind those bars. For instance, Mitnick is contemptuous of being put in solitary confinement so he can't "phone freak" (a form or hacking using an ordinary telephone), but then uses his severely limited (and monitored) prison pay phone time to phone freak anyway by dialing behind his back as a guard watches, apparently just for the thrill of it and with complete disregard for any consequences.

Even after he is apprehended multiple times, Mitnick still doesn't "get it." He is condescending to and openly critical of the FBI, local law enforcement, and the media throughout the book for their lax procedures, but still doesn't seem to understand why breaking and entering highly sensitive computer systems is wrong and dangerous. When they find his stolen database of thousands of credit card numbers, he doesn't understand why he should be prosecuted for possessing them because he didn't actually use them to steal money. "That would be wrong," he says. Another instance: he spends most of the book using cloned cell phones to make "free" calls all over the world, which are billed to unaware random consumers. This form of theft, as well as repeated breaking and entering, both electronically and physically, seems to be viewed as no problem.

While on the run Mitnick takes great pains to steal and set up new identities in Las Vegas, Denver, Seattle, and Raleigh NC, but each time he goes back to his old hacking and cell phone tricks only to get discovered again and again. In one scene he finally figures out that he is being tracked electronically by the authorities when he uses his cell phone, and is actually being followed by a helicopter that zeroes in on him every time he makes a call. Does he then stop making cell calls? No. Does he stop hacking? No. Even when he is suspicious of being compromised on the phone, he still keeps calling and talking "for hours" to the informant, and yet feels betrayed when they turn over what they have to the authorities.

Mitnick seems to blame everyone but himself most of the time for having the unmitigated gall to trust him through his so called "Social Engineering," which he both repeatedly relies on and harshly criticizes his marks for falling for. He even blames others who actually create the computer systems he feels compelled to compromise. It is much more difficult to create than it is to tear down, and instead of compromising these networks for "trophies," one is left wondering what the incredibly talented Mitnick could have done if he had spent as much time and energy building systems instead of breaking into and stealing information from them.

Mitnick's behavior is deeply disturbing. He writes, "It always seems strange to me that my captors had such trouble grasping the deep satisfaction that could be derived from a game of skill....what it was worth didn't matter to me. So what was the nature of my crime, that I allegedly had access?" It is not a game, and Mitnick completely misses the point, even now, after serving years in prison and being released. Mitnick is obsessive about his own privacy, and yet is utterly indignant about others' attention to and expectation of theirs? It just doesn't wash.
8 internautes sur 8 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Great book for people of all skillsets 8 octobre 2011
Par Daniel D. Lohin - Publié sur
Format: Relié Achat vérifié
I just finished this book and it is excellent. Kevin Mitnick was finally allowed to tell his side of the story after all these years and all the other "fake" stories of his life and capture were made. The book is really good at explaining technical topics in a very high level so that anyone who reads it of all skill levels can understand what is going on. For security professionals, this book is a must read. Sometimes in the world of IT security we get so hung up on firewalls, exploits, SQL injection and all the cool techie things but the completely forget about the social side of security and out users. This book will allow you to see the importance of security through user awareness training, strict procedures to follow, etc.

For people outside of security this is a great introduction for anyone who is worried about how hackers commonly steal information and break into systems. The book will never leave you with eyes glazed over in getting down to the really techie details. A lot of people have views of hackers that they see from the movies which is really crazy nerds with crazy monitors who can break into anything in minutes (think swordfish). This is far from the case with real attacks often taking months to years. The book really does a good job at making users understand that they are the most critical asset when it comes to securing their organizations data as well as their own. The crazy software products are important, but in the end it comes down to the users and what they will do.

I managed to briefly meet Kevin Mitnick at Derbycon (a security conference) this year and he was nice enough to sign my book which is really a nice added bonus!
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?