Kevin Mitnick is the founder of Defensive Thinking, an information security firm, L’art de la supercherie: Les révélations du plus célèbre hacker de la planète. Buy L’art de la supercherie by Kevin Mitnick, William-L Simon, Daniel Garance, Raymond Debonne (ISBN: ) from Amazon’s Book Store. Buy L’art de la supercherie by Kevin Mitnick, William-L Simon, Steve Wozniak, Daniel Garance, Raymond Debonne (ISBN: ) from Amazon’s.
|Published (Last):||12 October 2004|
|PDF File Size:||13.21 Mb|
|ePub File Size:||9.84 Mb|
|Price:||Free* [*Free Regsitration Required]|
Why or why not? Mitnick P Audible, Inc. Trivia About The Art of Decept Infamous social engineer Kevin Mitnick takes you through numerous stories of social engineers gaining access to important information using many techniques of deception. She hires a private detective to figure out where he’s hiding it. This book is not yet featured on Listopia. You don’t spell out the characters. The anecdotes and examples are insightful and supeercherie.
The Art of Deception Livre audio | Kevin Mitnick |
The anecdotes and examples are insightful and ente “The truth is that there is no technology in the world that can prevent a social engineering attack” p Mitnick describes many examples of social engineering; often con-artists that work remotely via phone or internet. Imen Tulip marked it as to-read Mar 29, Would you be willing to try another book from Kevin Mitnick?
There are entertaining stories throughout the book The Art of Deception is a book written d the notorious hacker of the s Kevin Mitnick who came to fame after a nationwide manhunt ending with his arrest in kevi The authors have just completed a new book, The Art of Intrusion.
As such I can’t help but think that this book is targeted to executives and not to the peon-types on the front lines, who in the anecdotes are the ones who inadvertently give away the keys to the kingdom. Having worked in IT for a while, I already knew a lot of this, especially how willing people are to just hand over their passwords and chuckle while they tell you not to break into their bank account because they use the same password for everything.
I work in InfoSec, and found this to be an excellent history lesson, with a few instances and situations where the human element of security threats still exist, such as the types of scams run to gain physical access. Yusuf S rated it it was amazing Apr 18, On Stranger Tides Any additional comments? Overall concept is good, gets the point across, but the age of the stories takes away from the overall value.
Autumn Smith — L’art De La Supercherie [French] by Kevin Mitnick,
Mitnick, who claims his career as a hacker was passed solely on manipulating people to gain information and access, shares stories of others who did the same. Since his release from federal prison, inMitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
Though I did feel bad sometimes for the conned people. Now a security consultant, he has spoken to audiences at conventions around the world, been on dozens of major national TV and radio shows, Kevin Mitnick, the world’s most famous former computer hacker, has been the subject of countless news and magazine articles, the idol of thousands of would-be hackers, and a one-time “most wanted” criminal of cyberspace, on the run from the bewildered Feds.
This material is dated and the narrator doesn’t pronounce many of the terms correctly. I returned it after 6 hours. Julian Jacobs added it Aug 24, No, it’s more text book than a story and I was hoping for a bit more charm.
How do you figure out where the money is being hidden? Andrius marked it as to-read Sep 25, Co-author William Simon is a bestselling co-author of numerous books, at iCon the biography of Steve Jobs and Kevin Mitnick’s previous two books. Dans cet ouvrage, Kevin Mitnick vous propose de dcouvrir des scnarios ralistes d arnaques et d escroqueries, tous bass sur l art de la persuasion et de la manipulation.
And it’s when you don’t think you can be fooled is when you are most likely to be. I especially enjoyed the story about how young Kevin and a friend of his in high school went to a tech convention and managed to thwart a super-secure system in development. If you like books and love to build cool products, we may be looking for you. The anecdotes are more interesting than entertaining, and all proceed by the same basic pattern: Zur Kritik Der Materialistischen Geschichtsauffassung by Hollitscher, Jakob, the canonical probability distribution, the partition function, and the chemical potential.
Brandon marked it as to-read Apr 25, The checkout lady gave me a concerned frown and told me to be careful.
See, that’s what the app is perfect for.
Mitnick refers to this as social engineering, and it’s obvious from his collection that a high degree of charisma is required to gain the trust or goodwill of subjects; Mitnick also points out how the actors manipulate the kebin they’re interacting with, supercheri buttons for sympathy and fear. Great book as a manual for security! Very dry but very informative. Amazingly, most of the techniques involve cracking the “people” rather than cracking the “code.