Goodreads helps you keep track of books you want to read.
Start by marking “Umění klamu” as Want to Read:
Umění klamu
Enlarge cover
Rate this book
Clear rating
Open Preview

Umění klamu

3.76 of 5 stars 3.76  ·  rating details  ·  3,305 ratings  ·  189 reviews
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling "The Art of Deception"
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studi
Hardcover, 348 pages
Published September 25th 2003 by Helion (first published January 1st 2001)
more details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Umění klamu, please sign up.

Be the first to ask a question about Umění klamu

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30 of 3,000)
filter  |  sort: default (?)  |  rating details
Kevin Mitnick, probably the most famous (and controversial) computer hacker of the 1990's, has spent several years of his life on the run, as well as a few years in jail. For years after leaving prison he was forbidden to log on to a computer, a prohibition he appealed successfully. He now runs a computer security business, lectures to large corporations, and has co-authored two books on computer network security.

This book focuses on the human element of computer security. Reminding us that eve
Pramod Nair
I went to prison for my hacking. Now people hire me to do the same things I went to prison for, but in a legal and beneficial way.” – Kevin D. Mitnick, Ghost in the Wires: My Adventures as the World's Most Wanted Hacker.

Reading ‘The Art of Deception’ is like hearing it straight from the horse's mouth. Kevin D. Mitnick, one of the legendary cyber desperado turned computer security consultant, takes the reader into the complex, supremely confident – often misunderstood as arrogance and curiosity
Rod Hilton
The Art of Deception is one of two books by famous hacker Kevin Mitnick, the other being "The Art of Intrusion". Intrusion focuses primarily on physical or technological hacks, while this book focuses almost exclusively on social engineering attacks.

A number of problems prevented this book from being very good. The main problem is simply that Mitnick did not have enough material to fill an entire book. This book would have been better if it were shorter and simply one section in a larger book ab
I suspect that if you're reading for entertainment, then you probably want Mitnick's The Art of Intrusion or Ghost in the Wires instead. This book is split 2/3 and 1/3 between a series of fictionalized anecdotes--based on or representative of real incidents--and a corporate policy guide. The guide, like all such specifications, is deadly dry and would require several readings and much thought to fully internalize.

The anecdotes are more interesting than entertaining, and all proceed by the same b
We think of computer hackers as sitting in an isolated room, endlessly probing corporate and private networks from their screen. Actually, almost all deep hacking starts with the manipulation of people to do something that allows the hacker to move to the next level. The Art of Deception tells how Mitnick used "social engineering" skills to get people to unknowingly provide critical assistance, from simply being polite and opening a secure door to setting up restricted user accounts. Having read ...more
G.M. Lupo
Kevin Mitnick is probably best known for being a phone phreak and fugitive computer hacker in the late-80s and early 90s, who was the focus of a considerable manhunt. Following his capture and time in prison, he's become an Internet security consultant and turned his talents to helping people avoid the sort of hacks he became famous for perpetrating. This book is a chronicle of numerous social engineering attacks, some hypothetical, some based on real-world examples (which may or may not have be ...more
In The Art of Deception, [Kevin Mitnick] discusses the thing he's best at: Social Engineering. Social engineering is the term used in computer security to describe the manipulation of humans in order to break through a security barrier, and is sometimes referred to as hacking the mind.

In the first chapter of his book, usually referred to as The Lost Chapter (As it wasn't published with the final version of the book), Kevin Mitnick tries to convince his readers that he is innocent – or at least
Koen Crolla
Almost all of this book consists of infinitesimal variations on the same point, communicated through accounts of apparently real events fictionalised by someone who clearly desperately wanted to write short stories instead of ghost-writing for minor celebrities but couldn't find a publisher for them. That every story reads like a bad (and I mean bad) noir film isn't just annoying; it makes them much less credible.
It's clear that Mitnick thinks very highly of himself and his accomplishments, occa
Jake Cohen
This book came in four parts. The first part is simply an introduction by Kevin Mitnick. Parts 2 and 3 are full of stories showing the techniques used by social engineers, from the perspective of the social engineer, or the victim, or often both. They also include an analysis of what was done and explanation of various terms and techniques.

The fourth part of the book was a laundry list of policies to put in place to defend against social engineering.

As someone who works in a company that has pre
Human's are like bad Microsoft coding.
Aidan MacDonald
To any who work at any business, to any who have an interest in computers, to any who enjoy a good crime, this is the book for you. Once being the renown most wanted hacker, Mitnick has given truth behind many ways you can protect yourself, protect your company and protect yourself against people who would deceive you. Obviously not the book for everybody, since some have no interest, but still a lot of information for all to learn if they desire it. Nobody is perfect, no security flawless and y ...more
Kevin Mitnick (whose teenage exploits were speculated at in the film War Games) describes himself not as a hacker, but a social engineer- one who is able to manipulate people and events through his knowledge of the inner workings of society. In this book, Mitnick describes many scenarios- some true, some hypothetical- including bank robbery, teenage break-ins, identity theft, and corporate espionage. In each scenario, we see how, with a couple of phone calls and a few simple questions, the attac ...more

Me crucé con este libro (está en la mula, por supuesto) y me lo he devorado en dos días. Hay una segunda parte, The Art of Intrusion, que parece que está incluso mejor.

Kevin Mitnick se hizo bastante famoso, para su desgracia, cuando le condenaron a unos cuantos años de cárcel por diversos delitos contra la seguridad electrónica de varias empresas y agencias estatales norteamericanas (nada grave según él, el holocausto informático según el fiscal). La Wikipedia (Kevin Mitnick, Kevin Mitnick ) cu

Doug Vanderweide
This review has been hidden because it contains spoilers. To view it, click here.
Maarten Koller
This book enhanced my ‘social-engineering-awareness’ significantly and the ‘cons’ were great to read! Though I did feel bad sometimes for the conned people ;).
Sometimes the book feels dated though when talking about telephone system hackers and how they use the system for their own purposes, posing as an onsite engineer trying to get something fixed and enlisting the help of ‘colleagues’ at the phone company, because the stuff they are doing onsite is nowadays done remotely. Luckily what is done
This book addresses CEOs and other such people high up the corporate ladder. The book is full of sentences like "Is YOUR company safe from such attacks on your ignorant personnel?" (well, not exactly maybe... I've read the book half a year ago and this is from memory) and each time I read one of them I wanted to tear the book apart and punch the author in the face. There is also a complete chapter of nearly 100 pages which is pretty much a complete information security policy. It might be me, bu ...more
Mitnick has his own reputation, which sets a pretty high bar for the audience who already knows his story. Unfortunately, while he knows the material, his skills as an author are less high.
It is quite clear that Mitnick wishes the book to be viewed as an attempt at redemption.

The cons are easy to read and do offer some genuine insights but not all are believable. The supporting material discussing these scenarios is pretty weak.

There's a rigid format ("Analyzing the con," "Preventing the con," e
Michelle Pod
This book has very interesting and useful information about social engineering, though it ultimately becomes repetitive. The stories of cons are interesting for about 100 pages, by page 250, Mitnick is basically rehashing the same story over and over. I had a hard time getting to the last section, which has some solid security advice but again, is information that has already been discussed. Basically, it could have been a great 150 page book but is instead an okay 350 page one.
Disappointed in the content of this book, I decided to donate it after reading maybe 50% of it.

Reading the book feels like listening to a security guard recount stories of all the things he's seen in his day. This is good for entertainment, but isn't appreciated it when the book is on "how to control the human element of security", and not "20 stories about how this one time a guy did a bad thing".

I'd pass on reading this book.
A very interesting look into the ease at which one can bypass the most elaborate security system simply by asking. The book proves that it is too easy for a person to obtain almost anything, if they have the right information and ask the right person. I am a system security major, and work at a helpdesk of a very large financial corporation. The number of employees that call me and readily hand me their passwords without question is disturbing. I am a good person, and have no need for these pass ...more
Russ Taylor
It's a decent book with numerous accounts of Social Engineering attacks that are quite interesting. Unfortunately, it's also somewhat like a textbook, with random notes and definitions thrown in that are quite easy to pick up just by reading the text.

Additionally, the end result is that no company can ever be completely immune from social engineering attack - no surprises there.
Matt Bibby
Mar 02, 2013 Matt Bibby rated it 4 of 5 stars  ·  review of another edition
Recommends it for: Anyone interested in corporate security
Yet another interesting book by Kevin Mitnick. Found it very humorous that several of the stories he tells about social engineers under a false name are actually stories about himself. If you have already read his most recent book "Ghost in the Wires" you will pick up on this. However, if you have read that book and are expecting the same kind of story, you will be disappointed. This book is directed toward companies looking to improve their security. Although sometimes it does seem like he's gi ...more
A bit dated, but much is still relevant

Picked up this one to read about Social Engineering from a guy who used to wear a black hat. since it was written over 12 years ago, some of the technical stuff is not quite accurate, but the types of cons presented here in story from could still happen.
Oct 03, 2008 Michelle rated it 4 of 5 stars  ·  review of another edition
Recommends it for: Anyone concerned about who has access to personal information
Comes off a little bit cocky at times, but that may be my take on it. Cocky or not, there is a lot of information between these pages that the public should be aware of for their own security. He is a genius who in high school managed to tap into the school's system to change a grade he didn't like... long story short, he wound up behind bars until the government hired him. (Guess we don't need to go there.) At any rate, he reveals some tactics people have used for identity theft, as well as rec ...more
Edin Osmanović
As I started exploring and learning about social engineering I picked up this book and started reading it. When I started reading I wasn't expecting to learn so much things just from this one book. Mitnick covered social engineering in all aspects. So many different situations, policies, how to act as social engineer are all well written and explained. After reading this book in middle of it I even picked up his documentary movie and saw how he was a black sheep and how did they treated him unfa ...more
Ryan Draga
Fascinating read...a real wakeup call. Even if you know nothing about Social Engineering and Information Security, this book will interest you. In fact, I ESPECIALLY recommend this book to anyone who finds themselves constantly feeling intimidated or scared stiff at the idea of giving out sensitive information to ANYONE.

Knowledge is power and the best defense against the Social Engineer. So who better to learn defensive techniques from than the world's most infamous hacker and social engineer? M
Jeff Yoak
This book is really creepy.

It serves as a how-to, and to a lesser extent a how-to-prevent, book on social engineering attacks. Most professionals in the industry understand that attacks are rarely purely technology-based. Much more often companies are compromised through a combination of human and computer vulnerabilities.

This book focuses on the human component of such attacks and is written from the perspective of someone who was extremely effective at executing such attacks. Though I was alre
Non e' oro tutto cio' che luccica !
Libro decisamente interessante che utilizzando lo stile delle storie brevi propone un panorama molto vario di tecniche di ingegneria sociale in presa diretta da storie realmente accadute. Ha l'innegabile merito di aiutare a far luce, grazie alla competenza in materia dell'autore, delle tecniche utilizzate da chi con abilita' e mestiere riesce a modificare i comportamenti delle persone per i propri scopi. Tali pratiche da sempre potenzialmente dannose tendono ad
Kyle Rush
Definitely a worthwhile read, especially in today's cybersecurity world. Amazing to see how social engineering has transformed and become more sophisticated over the years. Just wish the people that are this talented would use their skills for good!
Ralf Larisch
Ich besitze dieses Buch in der dt. Ausgabe "Die Kunst der Täuschung".
Soweit ich mich erinnere, in Deutschland, 2003 erschienen.
Kevin Mitnick, der in den 1980gern meist gesuchte "Hacker", seine Spezialität "Manipulation" von Menschen, Social Engineering.
« previous 1 3 4 5 6 7 8 9 99 100 next »
topics  posts  views  last activity   
Goodreads Librari...: ISBN-13 9780471237129 2 18 Feb 04, 2012 06:39PM  
  • Secrets and Lies: Digital Security in a Networked World
  • No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
  • Social Engineering: The Art of Human Hacking
  • The Fugitive Game: Online with Kevin Mitnick
  • Stealing the Network: How to Own the Box
  • Stealing the Network: How to Own a Continent
  • Hacking Exposed: Network Security Secrets & Solutions, Fifth Edition
  • Hacking: The Art of Exploitation
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • Security Engineering: A Guide to Building Dependable Distributed Systems
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • The Hacker Crackdown: Law and Disorder on the Electronic Frontier
  • Reversing: Secrets of Reverse Engineering
  • Hackers: Heroes of the Computer Revolution
  • The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
  • Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
  • Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
  • The Tangled Web: A Guide to Securing Modern Web Applications
Kevin Mitnick, the world's most famous (former) computer hacker, has been the subject of countless news and magazine articles, the idol of thousands of would-be hackers, and a one-time "most wanted" criminal of cyberspace, on the run from the bewildered Feds. Now a security consultant, he has spoken to audiences at conventions around the world, been on dozens of major national TV and radio shows, ...more
More about Kevin D. Mitnick...
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers Unauthorised Access: Physical Penetration Testing for IT Security Teams Hacker's Box : L'Art de la supercherie / Hacker's Guide The Art of Invisibility

Share This Book

“One noted software libertarian, Richard Stallman, even refused to protect his account with a password.” 0 likes
More quotes…