Skip to content

Art of Deception Controlling the Human Element of Security

Best in textbook rentals since 2012!

ISBN-10: 0471237124

ISBN-13: 9780471237129

Edition: 2002

Authors: Kevin D. Mitnick, William L. Simon, Steve Wozniak

List price: $39.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Written from the unique perspective of a former hacker, this title advises anyone involved with information security protection and policies on how social engineering attacks are executed and how they can be prevented.
Customers also bought

Book details

List price: $39.95
Copyright year: 2002
Publisher: John Wiley & Sons, Incorporated
Publication date: 10/11/2002
Binding: Hardcover
Pages: 368
Size: 6.25" wide x 9.25" long x 1.25" tall
Weight: 1.386
Language: English

Kevin Mitnick, the world's most famous (former) computer hacker, has been the subject of countless news and magazine articles, the idol of thousands of would-be hackers, and a one-time "most wanted" criminal of cyberspace, on the run from the bewildered Feds. Now a security consultant, he has spoken to audiences at conventions around the world, been on dozens of major national TV and radio shows, and even testified in front of Congress. He is the author of The Art of Deception and The Art of Intrusion . Co-author William Simon is a bestselling co-author of numerous books, including iCon (the biography of Steve Jobs) and Kevin Mitnick's previous two books. He has also written for USA Today…    

Foreword
Preface
Introduction
Behind the Scenes
Security's Weakest Link
The Art of the Attacker
When Innocuous Information Isn't
The Direct Attack: Just Asking for It
Building Trust
"Let Me Help You"
"Can You Help Me?"
Phony Sites and Dangerous Attachments
Using Sympathy, Guilt, and Intimidation
The Reverse Sting
Intruder Alert
Entering the Premises
Combining Technology and Social Engineering
Attacks on the Entry-Level Employee
Clever Cons
Industrial Espionage
Raising the Bar
Information Security Awareness and Training
Recommended Corporate Information Security Policies
Security at a Glance
Sources
Acknowledgments
Index