EUR 41,09
  • Tous les prix incluent la TVA.
Il ne reste plus que 2 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
No Tech Hacking: A Guide ... a été ajouté à votre Panier
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing (Anglais) Broché – 31 mars 2008

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 41,09
EUR 23,92 EUR 23,16
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations
click to open popover

Offres spéciales et liens associés

Descriptions du produit

Présentation de l'éditeur

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.

As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the secrets to bypassing every conceivable high-tech security system. This book reveals those secrets; as the title suggests, it has nothing to do with high technology.

• Dumpster Diving
Be a good sport and don’t read the two “D” words written in big bold letters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny).
• Tailgating
Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows.
• Shoulder Surfing
If you like having a screen on your laptop so you can see what you’re working on, don’t read this chapter.
• Physical Security
Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity?
• Social Engineering with Jack Wiles
Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security.
• Google Hacking
A hacker doesn’t even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful.
• P2P Hacking
Let’s assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself.
• People Watching
Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we’ll take a look at a few examples of the types of things that draws a no-tech hacker’s eye.
• Kiosks
What happens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash?
• Vehicle Surveillance
Most people don’t realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!

Biographie de l'auteur

Johnny Long is a Christian by grace, a professional hacker by trade, a pirate by blood, a ninja in training, a security researcher and author. He can be found lurking at his website ( He is the founder of Hackers For Charity(, an organization that provides hackers with job experience while leveraging their skills for charities that need those skills.

Kevin Mitnick (Technical Editor) is the most famous computer hacker in the world. Since his first arrest in 1981, at age 17, he has spent nearly half his adult life either in prison or as a fugitive. He has been the subject of three books and his alleged 1982 hack into NORAD inspired the movie War Games. Since his plea-bargain release in 2000, he says he has reformed and is devoting his talents to helping computer security.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Idées cadeaux de Noël
Idées cadeaux pour les enfants, les passionnés de plus encore! Retrouvez notre sélection rien que pour vous.

Détails sur le produit

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur (beta) 4.2 étoiles sur 5 22 commentaires
9 internautes sur 10 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Simple Threats Can Cause Serious Problems 9 avril 2008
Par K Rudolph - Publié sur
Format: Broché Achat vérifié
Johnny Long's book, "No Tech Hacking," brings new attention to overlooked aspects of information security. In his book, Long reveals how simple threats can cause serious problems, even in organizations prepared for a Mission Impossible-style attack scenario.

Long recounts how he and his team of ethical hackers consistently access sensitive information with no special equipment or technical skills. In fact, Long reveals how the ordinary (coat hangers, hand towels, drinking straws, baby powder, and aluminum cans) can result in extraordinary breaches of organizational security.

Long shares real world stories and cell-phone photographs from his adventures in people watching, shoulder surfing, dumpster diving, and vehicle observation.

Long and his colleagues go to great, conspicuous lengths to collect non-public information. While their targets should notice almost all of their activities, most do not. The closest thing to a consequence or confrontation they encounter is a glare from an airline passenger.

Why isn't Long confronted when others observe him surreptitiously taking pictures? Some people don't like to confront an unfamiliar person or don't know whom to report their concerns to. Others are complacent and don't expect negative events to occur. Action invites risk: risk of an awkward or unwarranted accusation, that one won't be taken seriously, and possible personal embarrassment. Sometimes, people feel that the safest action is no action at all. Unfortunately, that feeling of security is deceptive.

Thankfully, Long offers useful advice. He recommends that companies should:

1. Provide incentives for reporting suspicious activities, and
2. Make the desired response well-known and easy-to-do.

To follow these recommendations, organizations need to ensure that everyone knows what information to disclose and what information requires protection. Foremost, all organizations should create policies for verifying the identity of anyone who requests non-public information and adequately train all employees to recognize these situations and take appropriate actions.

In the next edition, it would be great to see more of the practical tips (perhaps even a detailed checklist for each chapter) about what do to protect against these simple, but damaging, threats.

Summary: This is a useful book for creating and spreading awareness of important and often overlooked aspects of information security.
5.0 étoiles sur 5 No Tech Hacking 4 mars 2010
Par Munya - Publié sur
Format: Broché Achat vérifié
Very useful book, teaches a lot about being aware of your environment at all times and paying attention to details
as Johny Long takes you on an exciting adventure of different methods that can seem trivial at first glance, but will result in a lot of information gathering for the pen-tester, highly recommended.
7 internautes sur 9 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 teach yourself the other side of the other side of security. 3 mars 2008
Par Tom is a nerd - Publié sur
Format: Broché Achat vérifié
Johnny Long is keeping up with his reputation, I have read many of his articles and his book "Google Hacking" and must say I will add this to the list of great books for corporate higher-ups, system administrators and people whom are curious about things of this nature. I have read the first 1/4 and will say that very little of this requires any tech knowledge to understand (unless you decide to do research on the Van Eck phreaking, which is well worth its time). Requires little tech knowledge, easy to read, and suited for anyone who likes their data to remain their own, or would like to make someone else's data their own. would recommend it to anyone interested in security from a business perspective, not relating to computers.
0 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Great 11 octobre 2009
Par Joel Esler - Publié sur
Format: Broché Achat vérifié
Making you pay attention to the obvious. Things that you would normally gloss over, suddenly you start seeing once you read this book.
2 internautes sur 7 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 An essential read for any Ethical Hacker/Red Team 15 avril 2008
Par Matthew "The Security Zealot" - Publié sur
Format: Broché Achat vérifié
It has been proven over the past few decades that physical security is one of the most over sighted areas in Information Security. It a system can be physically accessed, all the firewalls and other network devices mean nothing.

This book and its authors are all experts in their prospective areas of security. I can state that I have had the pleasure of interacting in one form or other with most of the authors over the last few years and I can attest that knowledge that is shared within the cover are only a glimpse of their individual knowledge set.

This book capitalized on the mind set of a hacker by thinking "outside of the box".
Ces commentaires ont-ils été utiles ? Dites-le-nous

Rechercher des articles similaires par rubrique


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?