Description

Book Synopsis


Table of Contents

Introduction xi

1 Artificial Social Intelligence 1

2 Social Engineering and Psychological Exploitation 19

3 A History of Technology and Social Engineering 53

4 A History of Language Modeling 83

5 Consciousness, Sentience, and Understanding 127

6 The Imitation Game 151

7 Weaponizing Social Intelligence 175

8 Weaponizing Technical Intelligence 215

9 Multimodal Manipulation 239

10 The Future 257

11 The Quest for Resolution 283

Appendix A: Bot Automation 295

Appendix B: LLM Pretext Engineering 303

Appendix C: CAPTCHA Bypass 317

Appendix D: Context Manipulation Attacks 321

Appendix E: Attack Optimization with Monte Carlo Simulations 333

Appendix F: Autonomous C2 Operations with LLMs 349

Appendix G: Disembodiment Attacks 353

Bibliography 357

Acknowledgments 373

About the Author 375

Index 377

The Language of Deception

Product form

£21.59

Includes FREE delivery

RRP £26.99 – you save £5.40 (20%)

Order before 4pm today for delivery by Tue 23 Dec 2025.

A Paperback / softback by Justin Hutchens, Stuart McClure

15 in stock


    View other formats and editions of The Language of Deception by Justin Hutchens

    Publisher: John Wiley & Sons Inc
    Publication Date: 01/01/2024
    ISBN13: 9781394222544, 978-1394222544
    ISBN10: 1394222548

    Description

    Book Synopsis


    Table of Contents

    Introduction xi

    1 Artificial Social Intelligence 1

    2 Social Engineering and Psychological Exploitation 19

    3 A History of Technology and Social Engineering 53

    4 A History of Language Modeling 83

    5 Consciousness, Sentience, and Understanding 127

    6 The Imitation Game 151

    7 Weaponizing Social Intelligence 175

    8 Weaponizing Technical Intelligence 215

    9 Multimodal Manipulation 239

    10 The Future 257

    11 The Quest for Resolution 283

    Appendix A: Bot Automation 295

    Appendix B: LLM Pretext Engineering 303

    Appendix C: CAPTCHA Bypass 317

    Appendix D: Context Manipulation Attacks 321

    Appendix E: Attack Optimization with Monte Carlo Simulations 333

    Appendix F: Autonomous C2 Operations with LLMs 349

    Appendix G: Disembodiment Attacks 353

    Bibliography 357

    Acknowledgments 373

    About the Author 375

    Index 377

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account