Home :: Books :: Professional & Technical  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical

Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
The Art of Deception: Controlling the Human Element of Security

The Art of Deception: Controlling the Human Element of Security

List Price: $27.50
Your Price: $18.15
Product Info Reviews

<< 1 2 3 4 5 6 .. 9 >>

Rating: 4 stars
Summary: great book!
Review: This is a great book for managers.

It is very non-technical and very interesting.

If this book does not scare the heck out of managers, nothing will.

Rating: 3 stars
Summary: what a crook making money
Review: I can't help but be amazed with his techincal skills. But a crook openly allowed to talk about cons..that would be illegal in Canada. Crime doesn't pay and thus freedom of speech has limits at least in Canada. Ya maybe if I read more of it I won't get conned, maybe he has my money now anyway.

Rating: 4 stars
Summary: the only book on the subject
Review: Social engineering, so important, yet so many books overlook it.

Read this, and weep.

Then get your infosec program working to stop social engineering.

Rating: 1 stars
Summary: He's just a grifter
Review: There's no technical knowledge here. Just a con artist conning you out of a few more bucks. Yeah, he's smart, yeah, he's clever. But he's not a hacker. Do your self a favor -- put some Scott Joplin on the stereo, and wait for this to be remaindered.

Rating: 5 stars
Summary: Mitnick offers unique and invaluable insight
Review: The Art of Deception is a must read for EVERYBODY, not just those directly responsible for securing information and/or computer systems. Becuase, as Mitnick points out, those individuals in corporations who are furthest removed from creating or enforcing security policies are often times the most common targets of social engineers becuase of this very fact. Reading this book, you will begin to realize that every, single one of us is a potential security vulnerability waiting to be exploited by a social engineer. In fact, many of the stories will probably have you recalling certain situations in your own past, and wondering if you've already been a target.
This book is totally unique in the information security field, because it focuses on strategies, tactics, and results and not on tools and technologies, which often times serve only to provide a false sense of security. This point is made most succinctly in Mitnick's tale of compromising (at the challenge of the manufacturer at a trade show) of a supposedly un-hackable operating system. Mitnick and his companion succeed in gaining administrator priveleges on the machine not by using traditional hacking techniques, rather by combining guile, amateur lock-picking skills, and exploiting carelesness and cockiness on the part of the developers (think of the Germans rolling around the Maginot line into France). After reading the stories in the book and the chapters at the end on security assesments and policies, you will have the knowledge to recognize the potential threats and to defend yourself and your company.
In addition to all of this, The Art of Deceptions is a captivating and enjoyable read.

Rating: 4 stars
Summary: Not bad - Social Engineer = con man
Review: I think he's right that technical hacking is mostly not terribly useful without being able to con the marks. Guy's a con man who knows computers a bit. Screw this "social engineering" bunkum. It's the art of the con.

I'd sure think twice before hiring him. How do you know he isn't casing your joint thinking about how to use what he learns? I'd say it's pretty unlikely he wouldn't be. On the other hand, ol' Kev' making an honest living making more money than a conman can could be a help for us all. I just have to wonder if a guy like him is capable of learning.

Kept thinking of "Stainless Steel Rat is Born" by Harrison reading his stuff. A lot of similarities, including Kevin has provided us with a lot of entertainment, which was one of the Rat's reasons.

Also kept thinking that maybe I oughta write a book. Used to do breakin scenarios for a bank. Kev' and his pals could learn a few things.

Rating: 1 stars
Summary: what a joke.
Review: What a tool. He cant even keep his own security company from being repeatedly hacked 6 or so times. I guess sitting in jail doesnt make you a security expert.

Rating: 5 stars
Summary: Missing Chapter 1
Review: Awesome book! But not quite as complete as Mitnick intended. Mitnick had wished to include a brief biographical sketch debunking the legendary persona created by New York Times tech hack John Markoff and detailing his ordeal at the hands of federal prosecutors. Unfortunately, the publisher rejected what were to be the juiciest parts of Chapter One.

Rating: 4 stars
Summary: A Real Eye-Opener!!
Review: Overall I'd say this is a must-read for anyone interested in corporate data security. It definitely gets you thinking about the vulnerabilities in your company. The only reason I did not give it 5 stars is because if anything it give TOO MANY examples of how social engineers can fool people into providing seemingly innocuous information and use it to achieve ther goal. If you are in IT or care about your companies data security, READ THIS BOOK!!!!

Rating: 5 stars
Summary: A Real Eye Opener
Review: This book was one of the best books I've read in a long time when it comes to security. Anybody who thinks that their information is secure because they have all the latest/greatest technology, or even the average computer illiterate person who thinks their information is all safe because their credit card companies, banks, etc deploy security strategies, need to read this book.

It really opens your eyes to how insecure corporations really are and how easily they can be penetrated and your information stolen. The examples are outrageous, as far as how easily they work.

I definitly recommend this book to everybody. Kevin does an excellent job of explaining everything in very simple terms so that everybody can understand whether you know a lot or a little.


<< 1 2 3 4 5 6 .. 9 >>

© 2004, ReviewFocus or its affiliates