Buy new:
-31% $15.12$15.12
Ships from: Amazon.com Sold by: Amazon.com
Save with Used - Good
$11.36$11.36
Ships from: Amazon Sold by: Sand Dollar Books

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the authors
OK
The Art of Deception: Controlling the Human Element of Security 1st Edition
Purchase options and add-ons
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
- ISBN-10076454280X
- ISBN-13978-0764542800
- Edition1st
- PublisherWiley
- Publication dateOctober 17, 2003
- LanguageEnglish
- Dimensions6 x 1 x 0 inches
- Print length368 pages
Discover the latest buzz-worthy books, from mysteries and romance to humor and nonfiction. Explore more

Explore your book, then jump right back to where you left off with Page Flip.
View high quality images that let you zoom in to take a closer look.
Enjoy features only possible in digital – start reading right away, carry your library with you, adjust the font, create shareable notes and highlights, and more.
Discover additional details about the events, people, and places in your book, with Wikipedia integration.
Frequently bought together

Customers who viewed this item also viewed
Editorial Reviews
Review
"...a lot of interesting cautionary tales..." (New Scientist, January 2004)
From the Inside Flap
Finally someone is on to the real cause of data security breaches-stupid humans ... Mitnick ... reveals clever tricks of the 'social engineering' trade and shows how to fend them off.
-Stephen Manes, Forbes
A tour de force, a series of tales of how some old-fashioned blarney and high-tech skills can pry any information from anyone. As entertainment, it's like reading the climaxes of a dozen complex thrillers, one after the other.
-Publishers Weekly
Mitnick provides hair-raising examples of social engineering-disgruntled employees stealing top-secret research, smooth-talking con men acquiring data on next-generation explosives for terrorists-and explains how to combat it.
-Angela Gunn, Time Out New York
He was the FBI's most-wanted hacker. But in his own eyes, Mitnick was simply a small-time con artist with an incredible memory [and] a knack for social engineering... This is Mitnick's account, complete with advice for how to protect yourself from similar attacks. I believe his story.
-Simson Garfinkel, Wired
From the Back Cover
"Finally someone is on to the real cause of data security breaches stupid humans Mitnick reveals clever tricks of the social engineering trade and shows how to fend them off."
Stephen Manes, Forbes
"A tour de force, a series of tales of how some old-fashioned blarney and high-tech skills can pry any information from anyone. As entertainment, it s like reading the climaxes of a dozen complex thrillers, one after the other."
Publishers Weekly
"Mitnick provides hair-raising examples of social engineering disgruntled employees stealing top-secret research, smooth-talking con men acquiring data on next-generation explosives for terrorists and explains how to combat it."
Angela Gunn, Time Out New York
"He was the FBI s most-wanted hacker. But in his own eyes, Mitnick was simply a small-time con artist with an incredible memory [and] a knack for social engineering This is Mitnick s account, complete with advice for how to protect yourself from similar attacks. I believe his story."
Simson Garfinkel, Wired
About the Author
William Simon is the bestselling author of more than twenty books.
Product details
- Publisher : Wiley
- Publication date : October 17, 2003
- Edition : 1st
- Language : English
- Print length : 368 pages
- ISBN-10 : 076454280X
- ISBN-13 : 978-0764542800
- Item Weight : 2.31 pounds
- Dimensions : 6 x 1 x 0 inches
- Best Sellers Rank: #85,141 in Books (See Top 100 in Books)
- #14 in Information Management (Books)
- #19 in Computer Hacking
- #23 in CompTIA Certification Guides
- Customer Reviews:
About the authors
William L. Simon is the author or co-author of more than 30 books, including numerous New York Times, national, and international bestsellers. Born in Washington, DC, he holds two degrees from Cornell University, and has been a freelance writer ever since -- first as a writer of documentaries, corporate, and informational films, then as a book author. He is a member of the Writers Guild of America, West, and now lives in Los Angeles.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book well-written and extremely informative, particularly praising its detailed explanations of social engineering techniques. Moreover, the stories are engaging, with one customer noting they are perfectly believable. However, the book receives mixed feedback regarding its pacing, with some finding it entertaining while others consider it extremely boring. Additionally, several customers mention the text is repetitive.
AI Generated from the text of customer reviews
Select to learn more
Customers find the book well written and interesting, describing it as a fun read.
"...The book is interesting for the most part, though it would have benefited from a 25% reduction in length, and there are some annoying stylistic tics...." Read more
"Simply amazing! I need to read this book again...." Read more
"...Still it is very accessible and would be a great book for someone not so familiar with computers and hacking to see how some of it is done...." Read more
"...Thank you Mr. Mitnick for your interesting and well written book. I noticed you have several other titles you have written...." Read more
Customers find the book extremely informative, particularly praising its detailed explanations of social engineering techniques and case studies.
"...yesterday and it hit me that Kevin's ideas are some of the most profound ideas when it comes to human behavior...." Read more
"Wow! This is a must read book for just about everyone, even those who have not entered the information age yet...." Read more
"...authors lay out, in considerable detail, outlines for recommended corporate information security policies, and an associated training program on..." Read more
"...Social Engineering' made simple...maybe that should be the name of this book...." Read more
Customers enjoy the story arc of the book, finding it interesting and engaging, with one customer noting that every scenario is perfectly believable.
"...An interesting tale told from the perspective of a reformed criminal. If you get a good price (i.e., used for 1 cent + shipping) then go for it." Read more
"...That being said, the stories are definitely entertaining, and worth reading." Read more
"...I like how its written its captivating and uses lots of story lines to back up the topics of the book." Read more
"...of this book (and absolute truth) is people are gullible & not security conscious and literally need it beaten into them to "verify, verify,..." Read more
Customers have mixed opinions about the book's repetition, with some finding it very repetitive, while one customer notes that the stories get old after the fifth chapter.
"...It was a great read. The sad thing is, though, that his stories get old after the fifth or sixth time you hear...." Read more
"...I am no expert in these areas, the outlines strike me as being commendably thorough - complete enough that they could be fleshed out without too..." Read more
"...to get through after the first few chapters because it is so very repetitive. Some technical information is also very out-of-date...." Read more
"...stories he chooses to share are fairly interesting, both in their daring and setup and in their simplicity...." Read more
Customers have mixed opinions about the pacing of the book, with some finding it entertaining while others describe it as extremely boring and a waste of time.
"...you get deeper into the book, it becomes repetitive, and ultimately, boring. I couldn't even force myself to finish this book...." Read more
"...Fun and entertaining reading, and it may scare you." Read more
"...all nice for all security people to read, but the ending - the policy read was boring." Read more
"extremely boring... nothing in here about hacking or protecting yourself from hackers...very dissappointed. waste of my time and waste of my money" Read more
Reviews with images

Damage in in books
Top reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on August 2, 2021Format: PaperbackVerified PurchaseI bought this book in 2008, and read it after I got it. I was in love with cyber-security and social engineering was the theme those days. I never reviewed the book back then but I reread this book again yesterday and it hit me that Kevin's ideas are some of the most profound ideas when it comes to human behavior.
Our tendency to be helpful.
Our tendency to let someone new come into our lives
Etc,..
I will be honest, after spending 13 years in financial and marketing industry and reading 1000s of books and having 1000s of experiences I promise if someone wants to set me up they probably can.
It's really hard to get away from a good setup.
One thing that helped me all these years is that at the end of the day I ask myself two questions. This is a routine I do every day and been doing it for almost 10 years now.
1. Did I try to help a stranger or someone I know today? If yes, then what was the context.
2. Did someone came in my life trying to do good things for me out of blue? (This can be a friend that randomly texts you on FB or emails you after ages.)
- Reviewed in the United States on November 17, 2002Format: HardcoverVerified PurchaseAfter reading it, the book makes one more aware of what to be careful when giving out information of any kind and how to protect yourself and your company's assets. I've heard alot of "Don't ever give out your id/password", "Always have firewalls on your network." One hardly ever hears about 'make sure you're giving information to someone who's supposed to have it'. There's tons of books on security with respect to technology but this is the first one I've seen that actually focuses on the weakest link when it comes to security - the human element.
All the firewalls and software can't prevent a social engineer from getting in if he/she knows justs how to act and/or what to say to get what they want. Reading the scenarios really opened my eyes. Theres a scenario where a social engineer pretended to be a manager of a video store. After enough talking to another employee at another branch, the social engineer was able to get enough information to obtain the credit card # of someone who owed money to the client the social engineer was hired by.
In reading the scenarios, I'd seen examples where I'd asked for the type of information described for perfectly legitimate reasons. I'd never imagined how someone could take just 1 or 2 pieces of information and create chaos for a person or a company. If you're in the IT industry, or work in any kind of customer service, you really need to pick up this book. This book doesn't bash people for being as helpful as they can be (team player, etc). He's just saying to be more aware of what's going on and when giving out any kind of information, being a little cautious doesn't hurt. As humans, we're not perfect to begin with, but a little awareness will make it just a little harder for that social engineer to get what they want.
- Reviewed in the United States on October 18, 2008Format: PaperbackVerified PurchaseWow! This is a must read book for just about everyone, even those who have not entered the information age yet.
In a world that incessantly grows complex and beyond the understanding of the common man, one simply cannot cope with the new risks and threats that arise on a daily basis. This leads to innocent mistakes that can cause us serious harm.
Often - techies and geeks believe technology is the answer - and to an extent that is true; however, the human element is the weakest link - and this book shows that in a nice way.
Read this book to understand the ploys used, the tactics of a vicious mind (or mischevious), and how easy it is for a vast majority of the people to fall victim. The good thing is that you will get ideas on what you and your company should be doing different.
Remember - although you will learn a lot - maintaining your guard and building immunity against deception is a moving traget. As such - you will need to strive and go beyond the many points covered in the book.
Read it and implement better practices in your work and life without any delay...the risks are not worth it.
Top reviews from other countries
-
R.T.Reviewed in Brazil on August 25, 2023
5.0 out of 5 stars Excelente livro, super recomendo!
Format: KindleVerified PurchaseExcelente livro, super recomendo, principalmente se você trabalha na área de segurança da informação!
- AkyReviewed in Italy on July 15, 2023
5.0 out of 5 stars Amazing book
Format: PaperbackVerified PurchaseI didn't read fully but it's just amazing. It got me hooked up.
-
FrancescoReviewed in Mexico on April 25, 2018
5.0 out of 5 stars Excelente libro
Format: PaperbackVerified PurchaseEs un libro consiso, facil de entender y escrito por una de las figuras mas importantes de la seguridad de la informacion. Solo me falta el capitulo final, pero ya queria opinar acerca de este libro. Del primer al penultimo capitulo es completamente entendible, dando definiciones claves para los no familiarizados con el tema de la informatica.
- kamatataimaReviewed in Germany on March 21, 2019
5.0 out of 5 stars very interesting
Format: PaperbackVerified Purchasegreat
-
風太Reviewed in Japan on June 7, 2003
5.0 out of 5 stars この本は危険だ。だけど、面白い。
Format: HardcoverVerified Purchase困難な状況に追い込まれたとき、人間は、誰も考えなかったような、とんでもないことを思いつく。本書に書かれている、ソーシャルエンジニアの犯行は、どれも、「よくこんなことを考えつくものだ」「なるほど、こんな手があったのか」と目から鱗が落ちる騙しの技術(Art of Deception)ばかりだ。読み物として、本当に面白い。「1ダースの複雑なミステリーのクライマックスの部分を次から次へと読むようなもの」と評されるのも納得できる。ただ、こうした、人間の負の想像力&創造力がもっと別の肯定的な方面に発揮できないか、と思うのは評者だけだろうか。