Skip to content

Art of Deception Controlling the Human Element of Security

Best in textbook rentals since 2012!

ISBN-10: 076454280X

ISBN-13: 9780764542800

Edition: 2004

Authors: Kevin D. Mitnick, William L. Simon, Steve Wozniak

List price: $16.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

The worlds most celebrated hacker delivers the lowdown on todays most serious security weakness--human nature"Finally someone is on to the real cause of data security breaches--stupid humans ... Mitnick ... reveals clever tricks of the social engineering trade and shows how to fend them off."--Stephen Manes, Forbes"A tour de force, a series of tales of how some oldfashioned blarney and hightech skills can pry any information from anyone. As entertainment, its like reading the climaxes of a dozen complex thrillers, one after the other."--Publishers Weekly"Mitnick provides hairraising examples of social engineering--disgruntled employees stealing topsecret research, smoothtalking con men…    
Customers also bought

Book details

List price: $16.95
Copyright year: 2004
Publisher: John Wiley & Sons, Incorporated
Publication date: 10/17/2003
Binding: Paperback
Pages: 368
Size: 6.00" wide x 9.00" long x 1.00" tall
Weight: 0.968
Language: English

Kevin Mitnick, the world's most famous (former) computer hacker, has been the subject of countless news and magazine articles, the idol of thousands of would-be hackers, and a one-time "most wanted" criminal of cyberspace, on the run from the bewildered Feds. Now a security consultant, he has spoken to audiences at conventions around the world, been on dozens of major national TV and radio shows, and even testified in front of Congress. He is the author of The Art of Deception and The Art of Intrusion . Co-author William Simon is a bestselling co-author of numerous books, including iCon (the biography of Steve Jobs) and Kevin Mitnick's previous two books. He has also written for USA Today…    

Foreword
Preface
Introduction
Behind the Scenes
Security's Weakest Link
The Art of the Attacker
When Innocuous Information Isn't
The Direct Attack: Just Asking for It
Building Trust
"Let Me Help You"
"Can You Help Me?"
Phony Sites and Dangerous Attachments
Using Sympathy, Guilt, and Intimidation
The Reverse Sting
Intruder Alert
Entering the Premises
Combining Technology and Social Engineering
Attacks on the Entry-Level Employee
Clever Cons
Industrial Espionage
Raising the Bar
Information Security Awareness and Training
Recommended Corporate Information Security Policies
Security at a Glance
Sources
Acknowledgments
Index