2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale
2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale__right

Book is in good condition and may contain underlining/highlighting and minimal wear. The book can also include "From the library of" labels. May not contain miscellaneous items (toys, dvds, etc.). We offer 100% money back guarantee and 24/7 customer service. Free 2-day shipping with Amazon Prime!
See more
Sold by VMG Books & Media and fulfilled by Amazon.
[{"displayPrice":"$13.91","priceAmount":13.91,"currencySymbol":"$","integerValue":"13","decimalSeparator":".","fractionalValue":"91","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"yoNUx3Tw3Ryv4xhEO%2BSsMUfhBVTE8133skRlfYmK8%2B22SgGgMNC%2FJdUdzrQMY%2F6R8b9N%2F5h6Orhuw8T2jV1SB3ptkGmO%2F5zYm%2B4iFJqT8oUBtsC%2F51PSTF4SL0AMcM4mCcWKVevUcPoXujKXynic5g%3D%3D","locale":"en-US","buyingOptionType":"NEW"},{"displayPrice":"$13.20","priceAmount":13.20,"currencySymbol":"$","integerValue":"13","decimalSeparator":".","fractionalValue":"20","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"iygW3QQWvPbWK4UysV3hzY9dDFHmh3yWJzSr9SdKCwnS5KqwDMjT8Ati3Wf8mRNCvPsZP9Hf5TK0xOE3ZXl5n4x88Hl%2BWyUbwpGWr0vzwRH2WVBET3chX5mgogM%2FAm8SGYeY8pfitJ7KvhELewfTPuHvnRMc6kC5f4yW7cqJLsrVi0VQUnBvh7UaJTwufC8N","locale":"en-US","buyingOptionType":"USED"}]
$$13.91 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$13.91
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
ADD TO LIST
Available at a lower price from other sellers that may not offer free Prime shipping.
SELL ON AMAZON
Share this product with friends
Text Message
WhatsApp
Copy
press and hold to copy
Email
Facebook
Twitter
Pinterest
Loading your book clubs
There was a problem loading your book clubs. Please try again.
Not in a club? Learn more
Join or create book clubs
Choose books together
Track your books
Bring your club to Amazon Book Clubs, start a new book club and invite your friends to join, or find a club that’s right for you for free. Explore Amazon Book Clubs
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Frequently bought together

+
+
Choose items to buy together.
Buy all three: $37.35
$13.91
$11.79
$11.65
Total price:
To see our price, add these items to your cart.
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Book details

Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Description

Product Description

Real-world advice on how to be invisible online from "the FBI''s most wanted hacker" (Wired).

Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility" -- online and real-world tactics to protect you and your family, using easy step-by-step instructions.

Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.

The world''s most famous -- and formerly the US government''s most wanted -- computer hacker, he has hacked into some of the country''s most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security. Invisibility isn''t just for superheroes; privacy is a power you deserve and need in the age of Big Brother and Big Data.

"Who better than Mitnick -- internationally wanted hacker turned Fortune 500 security consultant -- to teach you how to keep your data safe?" --Esquire

Review

Praise for The Art of Invisibility

"How would it feel to find out that your neighbor and friend has secretly observed you in your own home for years? The place that should be most private to you was not, and the intruder''s devices themselves weren''t something you''d ever have thought to look for. This kind of behavior is the opposite of giving normal people freedom and security, of valuing and respecting them as humans--and it''s happening more and more. The answer to peeping eyes and cyber theft is to move society toward greater cyber-security and it all starts with essential education about being private and invisible in our daily lives. Kevin''s book is the must read in this new world."― Steve Wozniak, cofounder, Apple Inc.

"The FBI''s most-wanted hacker."― Wired

"Who better than Mitnick -- internationally wanted hacker turned Fortune 500 security consultant -- to teach you how to keep your data safe from spear phishing, computer worms, and Fancy Bears?"― Esquire

"Offers a sobering reminder of how our raw data -- from email, cars, home Wi-Fi networks and so on -- makes us vulnerable."― Amy Webb, New York Times Book Review

"Mitnick''s new book aims to help everyone -- from the everyday internet users to the hardcore paranoid -- do a better job of keeping personal information private."― Laura Hautala, CNET

Praise for The Art of Deception

"The most famous computer hacker in the world. A tour de force."― Publishers Weekly

"The world''s most famous computer hacker and cybercult hero...has written a blueprint for system security based on his own experiences. Required reading for IT professionals, this book is highly recommended for public, academic, and corporate libraries."― Library Journal

Praise for Ghost in the Wires

"Intriguing, insightful and extremely educational into the mind of one who truly mastered the art of social engineering with the use of a computer and modern day technologies. I strongly believe that one can learn a great deal about protecting themselves once they understand how another one perpetrates the crime."― Frank W. Abagnale, author of Catch Me if You Can

About the Author

Kevin Mitnick has been the subject of countless profiles published and broadcast throughout the world. Mitnick''s leading penetration-testing team is highly respected and sought after for its security services by the world''s top corporations and governments. The company he founded, Mitnick Security Consulting LLC, has clients that include dozens from the Fortune 500 and many nations across the globe. Mitnick is the bestselling author of The Art of Invisibility, Ghost in the Wires, The Art of Intrusion, and The Art of Deception. He lives in Las Vegas and travels the world as the top keynote speaker on cybersecurity.

Product information

Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Videos

Help others learn more about this product by uploading a video!
Upload video
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Customers who bought this item also bought

Customer reviews

4.5 out of 54.5 out of 5
1,467 global ratings

Top reviews from the United States

K.B.
5.0 out of 5 starsVerified Purchase
A Must Read for Anyone Living in our Digital Age
Reviewed in the United States on June 24, 2017
This is a very informative book. While I''m not looking to go underground or off- grid, I will be making changes to protect my privacy online. I was outraged by the decision made by our country''s legislators to allow Internet providers to disclose and sell the online... See more
This is a very informative book. While I''m not looking to go underground or off- grid, I will be making changes to protect my privacy online. I was outraged by the decision made by our country''s legislators to allow Internet providers to disclose and sell the online browsing histories of their customers, which could affect prospective jobs and insurance. For example, if you or your child have a health issue or disability, and you search the Internet for information, a prospective employer who has access to this browsing history could interpret this to mean you will take more time off from work, or be more of a liability with insurance. This is just one type of example the book brings up, among numerous other situations I would never have even thought about. Great book, and thank-you, Kevin Mitnick!
103 people found this helpful
Helpful
Report
King
5.0 out of 5 starsVerified Purchase
This book addresses a great topic: The Art of Invisibility
Reviewed in the United States on March 28, 2018
This book addresses a great topic: The Art of Invisibility. The subtitle could have easily been: Why you do it, how you do it and what happens to you if you don’t do it. I’ve read all of Kevin’s books and I always keep a ballpoint pen and bright yellow marker at... See more
This book addresses a great topic: The Art of Invisibility. The subtitle could have easily been: Why you do it, how you do it and what happens to you if you don’t do it.

I’ve read all of Kevin’s books and I always keep a ballpoint pen and bright yellow marker at hand so that I can mark those special tidbits I want to remember, or refer back to at a later date. This book is so chucked full of information, I literally highlighted almost every paragraph and page.

The theme of the book is that we are all being tracked. If you use email, you are being tracked. If you visit a website, you are being tracked. If you use a cell phone, or shop at the market, drive a car, use WiFi or have a refrigerator that’s hooked up to the Internet, you are most likely being tracked. Do you use a credit card with a little square, silver colored chip on it? Have you ever wondered how much personal information maybe on that chip? The author discusses all of these things and much more. If you don''t like being tracked and want to learn how to become invisible, the author tells what to look for and how to harden your personal security in an effort to achieving that goal. In the end, however, he warns that becoming invisible is a very difficult task.

I highly recommend this book.
67 people found this helpful
Helpful
Report
Kevin Jennings
5.0 out of 5 starsVerified Purchase
Your potential employer saw your browsing history. You should have read this book before applying!
Reviewed in the United States on April 7, 2017
Where do I begin? I''ve been a computer geek my entire life. Well, since 1982, anyway. My dad bought me a Commodore 64 computer back then. I can''t hardly remember a single day that has passed since then that I haven''t had a computer in front of me at some point during... See more
Where do I begin? I''ve been a computer geek my entire life. Well, since 1982, anyway. My dad bought me a Commodore 64 computer back then. I can''t hardly remember a single day that has passed since then that I haven''t had a computer in front of me at some point during the day. Heh, I don''t know if that''s a good thing or a bad thing!

Anyway, as a developer and security enthusiast, I''ve always been interested in the hacking scene. Back then, when Kevin Mitnick and Kevin Poulson were in the news because of their "activities", I was glued to the t.v. I wanted to know everything they did! See, the thing is, I was like them. I craved knowledge. I wanted to explore that hidden and forbidden world of the byte and the baud that consisted of inter-connected mainframes and central stations via phone lines. I dialed into a lot of "boards" (BBSes) and got "forbidden knowledge" of what they used to call "phreaking" (phone hacking) from text files uploaded by phreakers. I thought it was just fun and games and never really did anything with the so-called "power" that I had gleaned from those text files.

Fast forward to today, things are a lot worse, security-wise, with regards to computer security and threats to your private information. Especially since our daily lives are now entertwined with this ubiquitous thing called the internet. Every interaction we perform in our browsers, or internet-enabled applications, leaves information and trails that can be used against us. Our phones, even our automobiles, can be used to track us via GPS. Our credit card purchases can be used to build profiles of us that can be bought and sold to third party customers. Recently, the current U.S. Republican administration repealed a bill that would''ve prevented ISPs from selling your browsing information to private parties. Nothing you do online is private anymore. Nothing. This isn''t like information that Facebook and Google collect on you. The ISP information is every single page that you go to in your browser. Think about this, for a moment: You have a medical condition. It''s being treated and no one but your closest family knows about it. Like almost everyone with your condition, you browse online about it and have joined online support groups. Your child also suffers from a condition. They are autistic. Like almost any concerned parent, you look online to learn more about you child''s condition and, too, to share your experiences and learn from others in similar situations. Recently, you''ve applied for a new job through a recruiter. They assure you that you''re a perfect fit based on your resume and your phone screening interview with them. They want to pass your resume on to the company now, which you give your consent to do so. Now, the company that will be doing the hiring does something that, in the past, they couldn''t have done: They buy your browsing history from your local ISP. They don''t need your consent for this. Your browsing data is considered the ISPs property now and can be sold as a commodity that is tied directly to you. Your prospective employer can now see that, based on your browsing history, that you have a medical condition and a child with autism. Which, more than likely, means you will probably miss a lot of work. So, they do what any good business will do: They pass on your resume. You don''t even get a chance to interview with them. Your resume gets deep-sixed based soley off your browsing history and nothing else.

Now, with that nightmare scenario fresh in your head, I want you to understand that when I say this book can help you to avoid such a situation, I really mean it. From encrypting your email, to setting up a VPN, to using the anonymous Tor Onion browser and other security methods, this book can help someone that doesn''t know anything about internet security by showing them how to secure their private information, their browsing habits, their email, and all online activity. Seriously, in this day and age, it''s almost a sin not to be aware of at least the basic dangers out there in "cyberspace". With this book, you can be very sure that if you follow the steps provided, you''ll be very secure from most of those threats.
152 people found this helpful
Helpful
Report
Max Casey
5.0 out of 5 starsVerified Purchase
Don''t read this review! Seriously, stop reading now!!!
Reviewed in the United States on April 29, 2017
I''m a 20 year IT sys admin and this book was awesome. Much of this stuff I knew already but Kevin puts it together like nobody else can; moreover, he puts it together so anyone can understand. It''s not just a book about how to become invisible to today''s... See more
I''m a 20 year IT sys admin and this book was awesome. Much of this stuff I knew already but Kevin puts it together like nobody else can; moreover, he puts it together so anyone can understand.

It''s not just a book about how to become invisible to today''s technology grid, it''s the Bible of how you are being screwed and used by what you probably don''t understand about your favorite gadget, app or appliance.

I don''t care if you don''t know the difference between Outlook or AOL, you need to get this book and finish it. It might very well be the most important book you read in the next five years.
77 people found this helpful
Helpful
Report
Edward J. Sellers
4.0 out of 5 starsVerified Purchase
Pretty good hack in itself: a fairly comprehensive resource AND a good read!
Reviewed in the United States on March 23, 2017
****** Starts out with basic security info concepts and builds on that nicely. In two places you are referred to later chapters where the tool for spoofing the MAC address is never actually identified - so Google it! The book identifies and describes a lot of useful tools... See more
****** Starts out with basic security info concepts and builds on that nicely. In two places you are referred to later chapters where the tool for spoofing the MAC address is never actually identified - so Google it! The book identifies and describes a lot of useful tools and techniques. I originally gave this a 4 - I had hoped to learn more from it. But I''ve just re-read it and pushed my rating from a 4 up to a 5 and wish I could give it a 6! I''ve been in security for quite a while and still learned a thing or two. When''s the last time you enjoyed reading resource material? Great coverage of a great topic.
56 people found this helpful
Helpful
Report
Josh Stack
4.0 out of 5 starsVerified Purchase
Not a bad book but not really for engineers
Reviewed in the United States on February 11, 2020
This book is great for someone who thinks that passwords like "Trump2020" or "password321" aren''t going to be cracked. This is a book I would recommend to someone like my parent''s that don''t understand much about privacy on the internet. It covers all the basics such as... See more
This book is great for someone who thinks that passwords like "Trump2020" or "password321" aren''t going to be cracked. This is a book I would recommend to someone like my parent''s that don''t understand much about privacy on the internet. It covers all the basics such as setting up VPNs, using password managers, using privacy OS''s like Tails, making untraceable transactions, encryption, MFA, etc. With that being said, anyone who doesn''t understand much regarding cyber security and how easy it is for someone to hijack your identity should definitely read this book. Mitnick does an excellent job bringing everything down to layman terms.
19 people found this helpful
Helpful
Report
David LeDoux
5.0 out of 5 starsVerified Purchase
This is an eye-opening read.
Reviewed in the United States on February 18, 2019
I reserve 5 star reviews strictly for those books that go beyond mere entertainment value and have had a direct impact on my life. After reading books that generally talk about how to obtain some semblance of privacy today or refer loosely to best practices, none... See more
I reserve 5 star reviews strictly for those books that go beyond mere entertainment value and have had a direct impact on my life.

After reading books that generally talk about how to obtain some semblance of privacy today or refer loosely to best practices, none of them have given any practical information about how to go about doing so.

This book changes all of that. The author builds you up throughout the first half of the book by giving you real, actionable steps to take intermingled with plenty of real-world examples of what has happened to people who have failed to do so.

In the second half of the book he tears you down by hammering you with reason after reason why you cannot realistically expect the slightest modicum of privacy in any area of your life in modern society.

Then, long after you''ve stopped wondering why you even bothered to read this far and are beginning g to get depressed, he shines a light of hope in the closing chapters; explaining in refreshing detail how it is possible to attain true anonymity. Not, however, without plenty of hard work and diligence.

After all this, the reader is left with one thing. To figure out your why and decide just how far into the vast ocean one wishes to venture.
21 people found this helpful
Helpful
Report
Erik Meyers
5.0 out of 5 starsVerified Purchase
Depressing....
Reviewed in the United States on August 15, 2020
I thought i had an idea what was going to be in this book, It was all that and 10 times more.. all bad. your privacy is/was/has been out the window for a long time now.. Although there is some things you can do to shore up your privacy most people won''t or... See more
I thought i had an idea what was going to be in this book,
It was all that and 10 times more.. all bad.
your privacy is/was/has been out the window for a long time now..
Although there is some things you can do to shore up your privacy most people won''t or don''t know how.
this book gives you Some tips on how to minimize your signature...key.
hope this helps.
8 people found this helpful
Helpful
Report

Top reviews from other countries

Irina
5.0 out of 5 starsVerified Purchase
Great read, lots of useful knowledge
Reviewed in the United Kingdom on February 2, 2020
It''s a great book by a great author! Really enjoy reading it. If you want to become paranoid or want to do some ~innocent things~ without being caught - definitely recommend it! I''m trying to learn about offsec to eventually do the course and the exam, and this book gives...See more
It''s a great book by a great author! Really enjoy reading it. If you want to become paranoid or want to do some ~innocent things~ without being caught - definitely recommend it! I''m trying to learn about offsec to eventually do the course and the exam, and this book gives me a good sense of what sort of things I should be looking for as a wanna-be security specialist.
2 people found this helpful
Report
.rhosts
5.0 out of 5 starsVerified Purchase
Protect your privacy!
Reviewed in the United Kingdom on May 22, 2017
Tips and tricks to minimise your online footprint from the master hacker himself, Kevin Mitnick. The book is full of information detailing exactly *what* data can be collected about you, together with *how* you can minimise the amount collected - perhaps even disappear...See more
Tips and tricks to minimise your online footprint from the master hacker himself, Kevin Mitnick. The book is full of information detailing exactly *what* data can be collected about you, together with *how* you can minimise the amount collected - perhaps even disappear completely! This book is excellent, as Kevin''s books usually are.
7 people found this helpful
Report
D.
3.0 out of 5 starsVerified Purchase
Not really that good...
Reviewed in the United Kingdom on June 18, 2017
It''s an ok book, nothing too revealing or new. It does get a bit annoying to read Mr. Kevin saying how smart and talented he is, or how others are just script kiddies when they hacked his account....anyway, do read a bit of it before buying to see if indeed this is...See more
It''s an ok book, nothing too revealing or new. It does get a bit annoying to read Mr. Kevin saying how smart and talented he is, or how others are just script kiddies when they hacked his account....anyway, do read a bit of it before buying to see if indeed this is something you want.
14 people found this helpful
Report
Dan
5.0 out of 5 starsVerified Purchase
good book for learn security
Reviewed in the United Kingdom on March 23, 2019
good book for learning how to protect yourself online
2 people found this helpful
Report
Amazon Customer
5.0 out of 5 starsVerified Purchase
A very useful security manual for all levels of users
Reviewed in the United Kingdom on December 26, 2018
The book is a security handbook for all users - from novices to experienced users. In one book, Mitnick, managed to include all the technigues one needs to understand to maximise security and personal privacy. A must read.
One person found this helpful
Report
See all reviews
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Customers who viewed this item also viewed

Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

More items to explore

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale

2021 popular The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe online sale discount in the Age of Big Brother and Big Data online sale