Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kevin Poulsen, "Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground"
Publisher: Crown | 2011 | 288 pages | ISBN-10: 0307588688 | File type: PDF | 1.37 mb
A superb, insider tour of the dark Internet that lies below "the whitewashed, commercialized" world of the Web. Kevin Poulsen is one of the very few people who understands the territory: the scammers, the scammers of the scammers, and the law enforcement officers trying to catch them. KINGPIN describes a parallel business world, including "the underground's first hostile takeover," where characters who call themselves names like DarkCyd and Matrix and Ghost23 battle for control of digital scams. It is a fascinating, scary ride. - Review
About the Book:
In a previous life, Poulsen served five years in prison for hacking. So the Wired senior editor and "Threat Level" blogger knows intimately the terrain he explores in this page-turning tale of the criminal exploits of a hacker of breathtaking ambition, Max Butler, who stole access to 1.8 million credit card accounts. Poulsen understands both the hows of hacking, which he explains clearly, as well as the whys, which include, but also can transcend, mere profit. Accordingly, his understanding of the hacking culture, and his extensive interviews with Butler, translates into a fascinating depiction of a cybercriminal underworld frightening in its complexity and its potential for harm, and a society shockingly vulnerable to cybercrime. The personalities, feuds, double dealing, and scams of the hackers are just one half of this lively story. The other half, told with equal verve, is law enforcement's efforts to find and convict Butler and his accomplices. (Butler is now serving a 13-year sentence and owes .5 million in restitution.) Poulsen renders the hacker world with such virtual reality that readers will have difficulty logging off until the very end.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Authorizations in SAP: 100 Things You Should Know About...
§¬§Ñ§Ü §ñ §å§Ü§â§Ñ§Ý §Þ§Ú§Ý§Ý§Ú§à§ß. §ª§ã§á§à§Ó§Ö§Õ§î §â§Ñ§ã§Ü§Ñ§ñ§Ó§ê§Ö§Ô§à§ã§ñ §Ü§Ñ§â§Õ§Ö§â§Ñ
OneNote: 8 Easy Ways To Master OneNote. Discover How to Use OneNote for Getting Things Done
CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Persp
Intelligence-Based Security in Private Industry
Strategic Information Security
Networked Filtering and Fusion in Wireless Sensor Networks
Architecting User-Centric Privacy-as-a-Set-of-Services: Digital Identity-Related Privacy Framework
Guide to Computer Network Security, 2nd edition (Computer Communications and Networks)
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Hacking: Secrets To Becoming A Genius Hack(3315)
Windows Hacking: crack all cool stuff of w(3261)
Hacking : The Ultimate Hacking for Beginne(3170)
Computer Hacking: A beginners guide to com(2766)
Hacking : An unofficial anonymous guide : (2737)
Hacking: The Ultimate Guide for You to Lea(2605)
Hacking: How to Hack Computers, Basic Secu(2443)
Protect Your Privacy: 17 Must-Know Ways to(2375)
Coding for Speed: A Hacker's Guide to a Fa(2313)
Ethical Hacking 101: How to conduct profes(2214)
Computer Hacking: A beginners guide to com(2133)
How to Hack Computers(2026)
Hacking: Tapping into the Matrix Tips, Sec(1935)
The Security Consultant's Handbook(1921)
Hack a Wifi Network: Easy way to access Wi(1896)