Authors: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted.

Kevin Mitnick

Biography

Author Profession: Businessman
Nationality: American
Born: August 6, 1963

Links

Find on Amazon: Kevin Mitnick
Cite this Page: Citation