This site uses cookies to deliver our services, improve performance, for analytics, and (if not signed in) for advertising. By using LibraryThing you acknowledge that you have read and understand our Terms of Service and Privacy Policy. Your use of the site and services is subject to these policies and terms.
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

Die Kunst der Täuschung: Risikofaktor…

Die Kunst der Täuschung: Risikofaktor Mensch (edition 2006)

by Kevin D. Mitnick, William Simon, Jürgen Dubau (Übersetzer)

MembersReviewsPopularityAverage ratingMentions
1,245139,332 (3.51)2
Title:Die Kunst der Täuschung: Risikofaktor Mensch
Authors:Kevin D. Mitnick
Other authors:William Simon, Jürgen Dubau (Übersetzer)
Info:Mitp-Verlag (2006), Edition: 1, Broschiert, 416 pages
Collections:Your library
Tags:social engineering

Work details

The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick



Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

» See also 2 mentions

English (12)  French (1)  All languages (13)
Showing 1-5 of 12 (next | show all)
The Art of Deception is written by a hacker (or, as he calls himself, a “social engineer”) and describes the ways in which hackers can exploit human nature to bypass security measures. The book was hyped as being “like reading the climaxes of a dozen complex thrillers”, but I don’t think it lived up that hype. Although I found it interesting to read about the clever ways hackers go about getting very classified information, it wasn’t exactly edge-of-your-seat reading.

Read the rest here... ( )
  DoingDewey | Nov 6, 2012 |
Didn't finish as the stories got repetitive.
  jcopenha | Jun 17, 2012 |
I had high hopes for this book: I've followed Mitnick's story for over a decade and have thoroughly enjoyed many of the books written about him and his exploits. I expected The Art of Deception to be no exception. Except it was.

The Art of Deception is more of a IT professional's handbook for preventing social engineering attacks on a corporation. There are two problems with this:

1) It's absolutely not, in any way, a book for casual readers looking to understand and discover some insights on the psychology of deception in a technical environment. If that's what you want, look elsewhere.

2) If an IT security professional working for any company needs a book this big to understand how to protect about social engineering... well they are in serious need of a career counselor and should consider a new profession.*

There's one more problem with the book: it's far too long, the stories are endlessly repetitive, and, well, everything else. Avoid.

*OK, that may be hyperbolic. But hear this, IT security professionals: buy this book, read the first chapter, then close it. Everything you need to know is in the first chapter. ( )
  fakelvis | Apr 2, 2012 |
Good information, however this thing read like a "....For Dummies" book. But worse. ( )
1 vote cafepithecus | Mar 23, 2011 |
Showing 1-5 of 12 (next | show all)
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
Important places
Important events
Related movies
Awards and honors
For Shelly Jaffe, Reba Vartanian, Chickie Leventhal, and Mithcell Mitnick, and for the late Alan Mitnick, Adam Mitnick, and Jack Biello

For Arynne, Victoria, and David, Sheldon, Vincent, and Elena
First words
A company may have purchased the best security technologies that money can buy, trained their people so well that they lock up all their secrets before going home at night, and hired building guards from the best security firm in the business.
Last words
(Click to show. Warning: May contain spoilers.)
Disambiguation notice
Publisher's editors
Publisher series
Information from the Italian Common Knowledge. Edit to localize it to your language.
Original language
Canonical DDC/MDS

References to this work on external resources.

Wikipedia in English (3)

Book description
Haiku summary

Amazon.com Amazon.com Review (ISBN 076454280X, Paperback)

The Art of Deception is about gaining someone's trust by lying to them and then abusing that trust for fun and profit. Hackers use the euphemism "social engineering" and hacker-guru Kevin Mitnick examines many example scenarios.

After Mitnick's first dozen examples anyone responsible for organizational security is going to lose the will to live. It's been said before, but people and security are antithetical. Organizations exist to provide a good or service and want helpful, friendly employees to promote the good or service. People are social animals who want to be liked. Controlling the human aspects of security means denying someone something. This circle can't be squared.

Considering Mitnick's reputation as a hacker guru, it's ironic that the last point of attack for hackers using social engineering are computers. Most of the scenarios in The Art of Deception work just as well against computer-free organizations and were probably known to the Phoenicians; technology simply makes it all easier. Phones are faster than letters, after all, and having large organizations means dealing with lots of strangers.

Much of Mitnick's security advice sounds practical until you think about implementation, when you realize that more effective security means reducing organizational efficiency--an impossible trade in competitive business. And anyway, who wants to work in an organization where the rule is "Trust no one"? Mitnick shows how easily security is breached by trust, but without trust people can't live and work together. In the real world, effective organizations have to acknowledge that total security is a chimera--and carry more insurance. --Steve Patient, amazon.co.uk

(retrieved from Amazon Thu, 12 Mar 2015 18:10:41 -0400)

Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented. Mitnick also offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.… (more)

(summary from another edition)

» see all 2 descriptions

Quick Links

Popular covers


Average: (3.51)
0.5 3
1 5
1.5 1
2 18
2.5 2
3 75
3.5 14
4 75
5 36

Is this you?

Become a LibraryThing Author.


About | Contact | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 129,520,712 books! | Top bar: Always visible