The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles,
Part 1 Behind the Scenes
Chapter 1 Security’s Weakest Link
Part 2 The Art of the Attacker
Chapter 2 When Innocuous Information Isn’t
Chapter 3 The Direct Attack: Just Asking for It
Chapter 4 Building Trust
…
Part 3 Intruder Alert
Chapter 10 Entering the Premises
Chapter 11 Combining Technology and Social
Engineering
Chapter 12 Attacks on Entry-Level Employee
…
Part 4 Raising the Bar
Chapter 15 Information Security Awareness and
Training
Chapter 16 Recommended Corporate Information
Security Policies
…etc…