Statements (48)
Predicate | Object |
---|---|
gptkbp:instanceOf |
book
|
gptkbp:author |
gptkb:Kevin_D._Mitnick
|
gptkbp:availableIn |
hardcover
paperback eBook |
gptkbp:contains |
case studies
security advice interviews with hackers |
gptkbp:covers |
cybersecurity threats
|
gptkbp:discusses |
network security
ethical hacking identity theft malware attacks phishing schemes social engineering tactics |
gptkbp:focus |
hacking stories
|
gptkbp:genre |
non-fiction
|
https://www.w3.org/2000/01/rdf-schema#label |
The Art of Intrusion
|
gptkbp:influencedBy |
social engineering
|
gptkbp:ISBN |
978-0764579013
|
gptkbp:language |
English
|
gptkbp:notable_event |
data protection laws
compliance requirements disaster recovery planning security audits penetration testing emergency response procedures business continuity planning cybersecurity policies risk management strategies security awareness training incident response plans vulnerability assessments |
gptkbp:notableFeature |
real-life hacking incidents
|
gptkbp:pageCount |
288
|
gptkbp:provides |
preventive measures
real-world examples insights into hacker mindset |
gptkbp:publishedBy |
Wiley
|
gptkbp:publishedIn |
gptkb:United_States
first-person perspective |
gptkbp:relatedTo |
computer security
|
gptkbp:releaseYear |
2005
|
gptkbp:sequel |
gptkb:The_Art_of_Deception
|
gptkbp:suitableFor |
IT professionals
students general readers |
gptkbp:targetAudience |
security professionals
|