Get 3 months of Audible free - Get this deal
Enjoy this audiobook free + more
Free title with your free trial!
$0.00
  • Click above to get a preview of our newest plan - unlimited listening to select audiobooks, Audible Originals, and podcasts.
  • You will get an email reminder before your trial ends.
  • $7.95 a month after 30 days. Cancel online anytime.
Sold and delivered by Audible, an Amazon company
List Price: $21.49
By completing your purchase, you agree to Audible’s Conditions Of Use, License, and Amazon's Privacy Notice. Taxes where applicable.
Sold and delivered by Audible, an Amazon company

The Art of Deception: Controlling the Human Element of Security Audible Audiobook – Unabridged

4.6 out of 5 stars 1,077 ratings

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."

Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent.

Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

Read & Listen

Switch between reading the Kindle book & listening to the Audible audiobook with Whispersync for Voice.
Get the Audible audiobook for the reduced price of $7.49 after you buy the Kindle book.
Prime Day Offer
Get 3 months of Audible FREE. Terms apply. Try now.

Product details

Listening Length 13 hours and 41 minutes
Author Kevin Mitnick
Narrator Nick Sullivan
Whispersync for Voice Ready
Audible.com Release Date July 10, 2020
Publisher Tantor Audio
Program Type Audiobook
Version Unabridged
Language English
ASIN B08C3849FL
Best Sellers Rank

Customer reviews

4.6 out of 5 stars
1,077 global ratings

Review this product

Share your thoughts with other customers

Customers say

Customers find the book well-written and extremely informative, particularly praising its detailed explanations of social engineering techniques. Moreover, the stories are engaging, with one customer noting they are perfectly believable. However, the book receives mixed feedback regarding its pacing, with some finding it entertaining while others consider it extremely boring. Additionally, several customers mention the text is repetitive.

54 customers mention "Readability"54 positive0 negative

Customers find the book well written and interesting, describing it as a fun read.

"Such a great book by such a talented person rest in peace, Kevin." Read more

"...The book is interesting for the most part, though it would have benefited from a 25% reduction in length, and there are some annoying stylistic tics...." Read more

"Simply amazing! I need to read this book again...." Read more

"...Still it is very accessible and would be a great book for someone not so familiar with computers and hacking to see how some of it is done...." Read more

48 customers mention "Information quality"43 positive5 negative

Customers find the book extremely informative, particularly praising its detailed explanations of social engineering techniques and case studies.

"...yesterday and it hit me that Kevin's ideas are some of the most profound ideas when it comes to human behavior...." Read more

"...authors lay out, in considerable detail, outlines for recommended corporate information security policies, and an associated training program on..." Read more

"Wow! This is a must read book for just about everyone, even those who have not entered the information age yet...." Read more

"...Social Engineering' made simple...maybe that should be the name of this book...." Read more

13 customers mention "Story arc"10 positive3 negative

Customers enjoy the story arc of the book, finding it interesting and engaging, with one customer noting that every scenario is perfectly believable.

"...An interesting tale told from the perspective of a reformed criminal. If you get a good price (i.e., used for 1 cent + shipping) then go for it." Read more

"...That being said, the stories are definitely entertaining, and worth reading." Read more

"...I like how its written its captivating and uses lots of story lines to back up the topics of the book." Read more

"...of this book (and absolute truth) is people are gullible & not security conscious and literally need it beaten into them to "verify, verify,..." Read more

10 customers mention "Repetition"4 positive6 negative

Customers have mixed opinions about the book's repetition, with some finding it very repetitive, while one customer notes that the stories get old after the fifth chapter.

"...It was a great read. The sad thing is, though, that his stories get old after the fifth or sixth time you hear...." Read more

"...I am no expert in these areas, the outlines strike me as being commendably thorough - complete enough that they could be fleshed out without too..." Read more

"...to get through after the first few chapters because it is so very repetitive. Some technical information is also very out-of-date...." Read more

"...stories he chooses to share are fairly interesting, both in their daring and setup and in their simplicity...." Read more

6 customers mention "Pacing"2 positive4 negative

Customers have mixed opinions about the pacing of the book, with some finding it entertaining while others describe it as extremely boring and a waste of time.

"...you get deeper into the book, it becomes repetitive, and ultimately, boring. I couldn't even force myself to finish this book...." Read more

"...Fun and entertaining reading, and it may scare you." Read more

"...all nice for all security people to read, but the ending - the policy read was boring." Read more

"extremely boring... nothing in here about hacking or protecting yourself from hackers...very dissappointed. waste of my time and waste of my money" Read more

Damage in in books
1 out of 5 stars
Damage in in books
BOOKS have damage! but in the headline its written NEW.
Thank you for your feedback
Sorry, there was an error
Sorry we couldn't load the review

Top reviews from the United States

  • Reviewed in the United States on June 15, 2025
    Format: PaperbackVerified Purchase
    Such a great book by such a talented person rest in peace, Kevin.
  • Reviewed in the United States on August 2, 2021
    Format: PaperbackVerified Purchase
    I bought this book in 2008, and read it after I got it. I was in love with cyber-security and social engineering was the theme those days. I never reviewed the book back then but I reread this book again yesterday and it hit me that Kevin's ideas are some of the most profound ideas when it comes to human behavior.

    Our tendency to be helpful.
    Our tendency to let someone new come into our lives
    Etc,..

    I will be honest, after spending 13 years in financial and marketing industry and reading 1000s of books and having 1000s of experiences I promise if someone wants to set me up they probably can.

    It's really hard to get away from a good setup.

    One thing that helped me all these years is that at the end of the day I ask myself two questions. This is a routine I do every day and been doing it for almost 10 years now.

    1. Did I try to help a stranger or someone I know today? If yes, then what was the context.
    2. Did someone came in my life trying to do good things for me out of blue? (This can be a friend that randomly texts you on FB or emails you after ages.)
    27 people found this helpful
    Report
  • Reviewed in the United States on November 17, 2002
    Format: HardcoverVerified Purchase
    After reading it, the book makes one more aware of what to be careful when giving out information of any kind and how to protect yourself and your company's assets. I've heard alot of "Don't ever give out your id/password", "Always have firewalls on your network." One hardly ever hears about 'make sure you're giving information to someone who's supposed to have it'. There's tons of books on security with respect to technology but this is the first one I've seen that actually focuses on the weakest link when it comes to security - the human element.
    All the firewalls and software can't prevent a social engineer from getting in if he/she knows justs how to act and/or what to say to get what they want. Reading the scenarios really opened my eyes. Theres a scenario where a social engineer pretended to be a manager of a video store. After enough talking to another employee at another branch, the social engineer was able to get enough information to obtain the credit card # of someone who owed money to the client the social engineer was hired by.
    In reading the scenarios, I'd seen examples where I'd asked for the type of information described for perfectly legitimate reasons. I'd never imagined how someone could take just 1 or 2 pieces of information and create chaos for a person or a company. If you're in the IT industry, or work in any kind of customer service, you really need to pick up this book. This book doesn't bash people for being as helpful as they can be (team player, etc). He's just saying to be more aware of what's going on and when giving out any kind of information, being a little cautious doesn't hurt. As humans, we're not perfect to begin with, but a little awareness will make it just a little harder for that social engineer to get what they want.
    12 people found this helpful
    Report
  • Reviewed in the United States on April 1, 2008
    Format: PaperbackVerified Purchase
    Kevin Mitnick, probably the most famous (and controversial) computer hacker of the 1990's, has spent several years of his life on the run, as well as a few years in jail. For years after leaving prison he was forbidden to log on to a computer, a prohibition he appealed successfully. He now runs a computer security business, lectures to large corporations, and has co-authored two books on computer network security.

    This book focuses on the human element of computer security. Reminding us that even the most sophisticated high-tech security systems can be rendered worthless if the people running them are not sufficiently vigilant, Mitnick goes on to point out the myriad ways in which human carelessness can contribute to security breaches. An experienced con artist who is well-versed in social engineering techniques can often do far more damage by manipulating people to provide information they shouldn't than by relying on technologically sophisticated hacking methods.

    The book is interesting for the most part, though it would have benefited from a 25% reduction in length, and there are some annoying stylistic tics. Throughout the first 14 chapters, each of which reviews a particular type of `con' used by hackers/social engineers to breach computer security, the chapter setup follows the same schema:
    (i) an anecdote or vignette, involving fictitious characters but based on actual events, which lays out the deception as it unfolds, following it through to the successful breach (ii) analysis of the `con', focusing specifically on the mistakes or behaviors (at the individual and at the organizational level) which allowed it to succeed (iii) discussion of the changes that would be needed to stop the con from succeeding (e.g. behavior of individual employees, corporate policies and procedures, computer software and hardware). This is actually a pretty decent way to make the points Mitnick wants to get across - starting out with a concrete example of how things go wrong gets attention and motivates the reader to read on to figure out the solution.

    One feature of the book which was meant to be helpful started to annoy me by about the third chapter. Interspersed throughout each chapter, the authors insert highlighted textboxes of two types: `lingo' - repeating the definition of a concept already adequately defined in the text, or `mitnick messages' - which seemed superfluous, and a little condescending, as they generally repeated what was already obvious. In general, this is not a book you will read for the delights of its prose style (after successfully gaining access to a cache of hidden documents, one hacker is described as spending his evening gleefully "pouring over" the documents); however, the prose is serviceable, managing to avoid lapses into the dreaded corpspeak, for the most part.

    For some readers, the most useful part of the book may be its final two chapters. Here the authors lay out, in considerable detail, outlines for recommended corporate information security policies, and an associated training program on information security awareness. Though I am no expert in these areas, the outlines strike me as being commendably thorough - complete enough that they could be fleshed out without too much difficulty to generate a comprehensive set of policies and procedures.

    Despite some redundancy, and occasional infelicities of style, this book seemed to me to be interesting, and likely to be practically useful.
    9 people found this helpful
    Report

Top reviews from other countries

Translate all reviews to English
  • R.T.
    5.0 out of 5 stars Excelente livro, super recomendo!
    Reviewed in Brazil on August 25, 2023
    Format: KindleVerified Purchase
    Excelente livro, super recomendo, principalmente se você trabalha na área de segurança da informação!
    Report
  • Aky
    5.0 out of 5 stars Amazing book
    Reviewed in Italy on July 15, 2023
    Format: PaperbackVerified Purchase
    I didn't read fully but it's just amazing. It got me hooked up.
  • Francesco
    5.0 out of 5 stars Excelente libro
    Reviewed in Mexico on April 25, 2018
    Format: PaperbackVerified Purchase
    Es un libro consiso, facil de entender y escrito por una de las figuras mas importantes de la seguridad de la informacion. Solo me falta el capitulo final, pero ya queria opinar acerca de este libro. Del primer al penultimo capitulo es completamente entendible, dando definiciones claves para los no familiarizados con el tema de la informatica.
  • kamatataima
    5.0 out of 5 stars very interesting
    Reviewed in Germany on March 21, 2019
    Format: PaperbackVerified Purchase
    great
  • 風太
    5.0 out of 5 stars この本は危険だ。だけど、面白い。
    Reviewed in Japan on June 7, 2003
    Format: HardcoverVerified Purchase
     困難な状況に追い込まれたとき、人間は、誰も考えなかったような、とんでもないことを思いつく。本書に書かれている、ソーシャルエンジニアの犯行は、どれも、「よくこんなことを考えつくものだ」「なるほど、こんな手があったのか」と目から鱗が落ちる騙しの技術(Art of Deception)ばかりだ。読み物として、本当に面白い。「1ダースの複雑なミステリーのクライマックスの部分を次から次へと読むようなもの」と評されるのも納得できる。ただ、こうした、人間の負の想像力&創造力がもっと別の肯定的な方面に発揮できないか、と思うのは評者だけだろうか。