Breaking and entering : the extraordinary story of a hacker called 'Alien'
- 1 of 1 copy available at LARL/NWRL Consortium.
- 1 of 1 copy available at Lake Agassiz Regional Library. (Show preferred library)
0 current holds with 1 total copy.
View other formats and editions
|Location||Call Number / Copy Notes||Barcode||Shelving Location||Status||Due Date|
|Crookston Public Library||MP3CD TALKING BOOK 005.8092 SMI (Text)||33500013001342||Main||Available||-|
- ISBN: 1980028109
- ISBN: 9781980028109
1 audio disc (12 hr.) : digital, stereo ; 4 3/4 in.
- Edition: Unabridged.
- Publisher: Prince Frederick, Md. : Recorded Books, 
- Copyright: ℗2019
|General Note:||Title from container.
Spoken audio file. Indexed by chapter.
In container (19 cm.).
Compact disc, MP3 format.
|Participant or Performer Note:||Narrated by Jonathan Todd Ross.|
|Summary, etc.:||When she arrived at MIT in the 1990s, Alien wanted to study aerospace engineering, but she was soon drawn to the school's venerable tradition of high-risk physical trespassing: the original 'hacking.' Within a year, one of her hallmates was dead, two others were on trial, and two had been institutionalized. And Alien's adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her large cache of virtual weapons-and the trespassing and social engineering talents she first developed while 'hacking' at MIT. The company tested its clients' security by every means possible-not just coding, but donning disguises and sneaking past guards and secretaries into the C-suite. (She once got into the vault of a major bank by posing as its auditor.) Alien now runs her own boutique hacking outfit that caters to some of the world's biggest and most vulnerable institutions-banks, retailers, government agencies. Her work combines devilish charm, old-school deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, character-driven, pacey treatment it deserves.|
|System Details Note:||
System requirements: CD/MP3 player or PC with MP3-capable software.
Search for related items by subject
BIOGRAPHY & AUTOBIOGRAPHY Criminals & Outlaws
Hackers United States Biography
Computer security United States
Computer crimes United States