ABSTRACT

This book details the exploits of numerous hackers, alleged to be true stories, and in many of the cases describes enough about the interests and motivations of the subjects to give us some insight into their personalities. We select just a few examples from The Art of Intrusion to identify some of the personalities and what drove them to the exploits described in the book.