Description

Book Synopsis
Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.

Trade Review
“…a fascinating read…” (ForTean Times, June 2004)

"...a lot of interesting cautionary tales..." (New Scientist, January 2004)



Table of Contents
Foreword.

Preface.

Introduction.

Part 1: Behind the Scenes.

Chapter 1: Security's Weakest Link.

Part 2: The Art of the Attacker.

Chapter 2: When Innocuous Information Isn't.

Chapter 3: The Direct Attack: Just Asking for It.

Chapter 4: Building Trust.

Chapter 5: "Let Me Help You".

Chapter 6: "Can You Help Me?".

Chapter 7: Phony Sites and Dangerous Attachments.

Chapter 8: Using Sympathy, Guilt, and Intimidation.

Chapter 9: The Reverse Sting.

Part 3: Intruder Alert.

Chapter 10: Entering the Premises.

Chapter 11: Combining Technology and Social Engineering.

Chapter 12: Attacks on the Entry-Level Employee.

Chapter 13: Clever Cons.

Chapter 14: Industrial Espionage.

Part 4: Raising the Bar.

Chapter 15: Information Security Awareness and Training.

Chapter 16: Recommended Corporate Information Security Policies.

Security at a Glance.

Sources.

Acknowledgments.

Index.

The Art of Deception

Product form

£9.50

Includes FREE delivery

RRP £10.00 – you save £0.50 (5%)

Order before 4pm tomorrow for delivery by Mon 22 Dec 2025.

A Paperback / softback by Kevin D. Mitnick, William L. Simon, Steve Wozniak

15 in stock


    View other formats and editions of The Art of Deception by Kevin D. Mitnick

    Publisher: John Wiley & Sons Inc
    Publication Date: 17/10/2003
    ISBN13: 9780764542800, 978-0764542800
    ISBN10: 076454280X

    Description

    Book Synopsis
    Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.

    Trade Review
    “…a fascinating read…” (ForTean Times, June 2004)

    "...a lot of interesting cautionary tales..." (New Scientist, January 2004)



    Table of Contents
    Foreword.

    Preface.

    Introduction.

    Part 1: Behind the Scenes.

    Chapter 1: Security's Weakest Link.

    Part 2: The Art of the Attacker.

    Chapter 2: When Innocuous Information Isn't.

    Chapter 3: The Direct Attack: Just Asking for It.

    Chapter 4: Building Trust.

    Chapter 5: "Let Me Help You".

    Chapter 6: "Can You Help Me?".

    Chapter 7: Phony Sites and Dangerous Attachments.

    Chapter 8: Using Sympathy, Guilt, and Intimidation.

    Chapter 9: The Reverse Sting.

    Part 3: Intruder Alert.

    Chapter 10: Entering the Premises.

    Chapter 11: Combining Technology and Social Engineering.

    Chapter 12: Attacks on the Entry-Level Employee.

    Chapter 13: Clever Cons.

    Chapter 14: Industrial Espionage.

    Part 4: Raising the Bar.

    Chapter 15: Information Security Awareness and Training.

    Chapter 16: Recommended Corporate Information Security Policies.

    Security at a Glance.

    Sources.

    Acknowledgments.

    Index.

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account