Obtenez 3 mois à 0,99 $/mois + 20 $ de crédit Audible

OFFRE D'UNE DURÉE LIMITÉE
Page de couverture de The Art of Invisibility

The Art of Invisibility

The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Aperçu
En profiter Essayer pour 0,00 $
L'offre prend fin le 1 décembre 2025 à 23 h 59, HP.
Abonnez-vous à Audible pour 0,99 $/mois pendant les 3 premiers mois et obtenez un crédit de 20 $ en prime sur Audible.ca. La notification de crédit sera envoyée par courriel.
1 nouveauté ou titre populaire à choisir chaque mois – ce titre vous appartiendra.
L'écoute illimitée des milliers de livres audio, de balados et de titres originaux inclus.
L'abonnement se renouvelle automatiquement au tarif de 0,99 $/mois pendant 3 mois, et au tarif de 14,95 $/mois ensuite. Annulation possible à tout moment.
Choisissez 1 livre audio par mois dans notre incomparable catalogue.
Écoutez à volonté des milliers de livres audio, de livres originaux et de balados.
L'abonnement Premium Plus se renouvelle automatiquement au tarif de 14,95 $/mois + taxes applicables après 30 jours. Annulation possible à tout moment.

The Art of Invisibility

Auteur(s): Kevin Mitnick, Robert Vamosi, Mikko Hypponen - introduction
Narrateur(s): Ray Porter
En profiter Essayer pour 0,00 $

14,95 $/mois après 3 mois. L'offre prend fin le 1 décembre 2025 à 23 h 59, HP. Annulation possible à tout moment.

14,95$ par mois après 30 jours. Annulable en tout temps.

Acheter pour 32,62 $

Acheter pour 32,62 $

À propos de cet audio

Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility" -- online and real-world tactics to protect you and your family, using easy step-by-step instructions.

Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.

The world's most famous -- and formerly the US government's most wanted -- computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security. Invisibility isn't just for superheroes; privacy is a power you deserve and need in the age of Big Brother and Big Data.
Histoire et culture Réseaux sociaux et création de contenu Sécurité et chiffrement Technologie Sécurité informatique Piratage Computer Security Personal Security

Ce que les critiques en disent

Praise for The Art of Invisibility

"How would it feel to find out that your neighbor and friend has secretly observed you in your own home for years? The place that should be most private to you was not, and the intruder's devices themselves weren't something you'd ever have thought to look for. This kind of behavior is the opposite of giving normal people freedom and security, of valuing and respecting them as humans--and it's happening more and more. The answer to peeping eyes and cyber theft is to move society toward greater cyber-security and it all starts with essential education about being private and invisible in our daily lives. Kevin's book is the must read in this new world."—Steve Wozniak, cofounder, Apple Inc.
"The FBI's most-wanted hacker."—Wired
"Who better than Mitnick -- internationally wanted hacker turned Fortune 500 security consultant -- to teach you how to keep your data safe from spear phishing, computer worms, and Fancy Bears?"—Esquire
"Offers a sobering reminder of how our raw data -- from email, cars, home Wi-Fi networks and so on -- makes us vulnerable."—Amy Webb, New York Times Book Review
"Mitnick's new book aims to help everyone -- from the everyday internet users to the hardcore paranoid -- do a better job of keeping personal information private."—Laura Hautala, CNET
Praise for The Art of Deception

"The most famous computer hacker in the world. A tour de force."—Publishers Weekly
"The world's most famous computer hacker and cybercult hero...has written a blueprint for system security based on his own experiences. Required reading for IT professionals, this book is highly recommended for public, academic, and corporate libraries."—Library Journal
Praise for Ghost in the Wires

"Intriguing, insightful and extremely educational into the mind of one who truly mastered the art of social engineering with the use of a computer and modern day technologies. I strongly believe that one can learn a great deal about protecting themselves once they understand how another one perpetrates the crime."—Frank W. Abagnale, author of Catch Me if You Can
Tout
Les plus pertinents
Kevin Mitnick, in case you aren’t familiar with the name, is a former hacker and convicted criminal now turned white-hat penetration tester - and author of several books about it. And as you can judge from the subtitle, not at all modest about it either. But undeniably a font of knowledge on the matter.

You may be aware that your actions online aren’t totally anonymous, but in the past few years changes to technology and to laws have made that drastically even less true, likely without you realizing. This book is a very useful eye-opener for everyone, whether you think you need it or not. Do you have “smart appliances” or tv in your home? Did you know you can go to jail for deleting your browser history even if you’ve done nothing wrong? Do you want to know how to minimize your risk online? This is a good overview and summary of all these and more.

Mitnick goes all the way to showing you how to be completely invisible online, which is a very difficult thing these days, but you can take away as much or as little of that as you need. Still, as he points out there are legitimate reasons why you might need to know this stuff. For example, escaping an abusive relationship (or talking to a friend who is). Going through a bitter divorce. Living in or travelling to a country with very restrictive internet rules. Need to travel overseas with a laptop or other device containing confidential data that you’re professionally obliged to protect (doctor/lawyer confidentiality for example, or company research secrets). This book will help you become aware of issues you may not even know about, and how to deal with them to whatever level you need.

Information everyone should know

Un problème est survenu. Veuillez réessayer dans quelques minutes.

This would have been good....4 years ago. Its mostly pretty obvious and outdated information now.

Good for its time

Un problème est survenu. Veuillez réessayer dans quelques minutes.

I have mixed feelings about the book, and it wasn't quite what I was expecting. I'll rate it four stars because I think it's good content but probably just not for me.

The first thing I noticed is that the advice given either seems to fall into two categories. The very basic, such as password strength guides and tips, how passwords are broken, password managers, drive encryption, browser cache and private browsing, recommended addons, etc. These are great for someone who is new to computer security, but ultimately I didn't learn much from it.

The second category is the very advanced, specific, and involved. Things like getting burner phones, separate devices to separate your anonymous presence from your real world identity, bribing strangers to purchase gift cards on your behalf, TOR onion routing, laundering bitcoin, plausible deniability, etc. All of these things are rather extreme steps, probably only useful to a foreign affairs reporter or whistleblower, not greatly useful to the average person trying to minimize their online footprint. Worse is that a lot of it is presented as "this is what this infamous criminal did wrong and got him caught, and here's what he should have done", this could be Mitnick leaning into the romanticized hacker archetype or his 'badboy' reputation, but it gives the book a certain... Shady vibe? Like saying that it's useful to reporters for plausible deniability while sounding like the advice was intended for an audience with more questionable intent. Idk, pet peeve maybe, but nonetheless I doubt most people would benefit from or understand this half of the books advice.

There are a couple of chapters in the middle that have more useful general advice; For example, how sites track you, example cases, and what to do about it. These are more just case studies highlighting how electronic tracking in the modern world has spiraled out of control and why you should care about privacy.

Lastly, although the book is only a few years old it's already starting to show its age. As rapidly evolving and ever-changing technology marches on, I expect that in a few more years a good portion of the specific advice will be outdated.

So if you've done any IT-Sec before you probably won't learn much new, and the more extreme steps / advice are unlikely to be beneficial for most people. Take these things into consideration and decide whether this book is right for you.

Mixed Feelings.

Un problème est survenu. Veuillez réessayer dans quelques minutes.

Very good content from Kevin in this book. Even though I'll probably never get to the point where I need to exercise this information, it's good to have it as a resource. #Audible1

Good content, good narration.

Un problème est survenu. Veuillez réessayer dans quelques minutes.

Excellent information on the many ways you are vulnerable to data, privacy and sensitive information attacks.

Excellent information to protect your privacy.

Un problème est survenu. Veuillez réessayer dans quelques minutes.

Not nearly as Mitnick’s Ghost in the Wires (it was FANTASTIC and full of real life suspense), but still interesting. Lots of practical information.

Good but not his best

Un problème est survenu. Veuillez réessayer dans quelques minutes.

If you have some knowledge of privacy tools it may be redundant. I learned some new things but was expecting better stories and technology.

Good book but

Un problème est survenu. Veuillez réessayer dans quelques minutes.