Goodreads helps you keep track of books you want to read.
Start by marking “Umění klamu” as Want to Read:
Umění klamu
Enlarge cover
Rate this book
Clear rating

Umění klamu

3.75 of 5 stars 3.75  ·  rating details  ·  2,922 ratings  ·  173 reviews
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling "The Art of Deception"
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studi
...more
Hardcover, 348 pages
Published September 25th 2003 by Helion (first published January 1st 2001)
more details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Umění klamu, please sign up.

Be the first to ask a question about Umění klamu

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30 of 3,000)
filter  |  sort: default (?)  |  rating details
David
Kevin Mitnick, probably the most famous (and controversial) computer hacker of the 1990's, has spent several years of his life on the run, as well as a few years in jail. For years after leaving prison he was forbidden to log on to a computer, a prohibition he appealed successfully. He now runs a computer security business, lectures to large corporations, and has co-authored two books on computer network security.

This book focuses on the human element of computer security. Reminding us that eve
...more
Rod Hilton
The Art of Deception is one of two books by famous hacker Kevin Mitnick, the other being "The Art of Intrusion". Intrusion focuses primarily on physical or technological hacks, while this book focuses almost exclusively on social engineering attacks.

A number of problems prevented this book from being very good. The main problem is simply that Mitnick did not have enough material to fill an entire book. This book would have been better if it were shorter and simply one section in a larger book ab
...more
Derek
I suspect that if you're reading for entertainment, then you probably want Mitnick's The Art of Intrusion or Ghost in the Wires instead. This book is split 2/3 and 1/3 between a series of fictionalized anecdotes--based on or representative of real incidents--and a corporate policy guide. The guide, like all such specifications, is deadly dry and would require several readings and much thought to fully internalize.

The anecdotes are more interesting than entertaining, and all proceed by the same b
...more
Khalid
In The Art of Deception, [Kevin Mitnick] discusses the thing he's best at: Social Engineering. Social engineering is the term used in computer security to describe the manipulation of humans in order to break through a security barrier, and is sometimes referred to as hacking the mind.

In the first chapter of his book, usually referred to as The Lost Chapter (As it wasn't published with the final version of the book), Kevin Mitnick tries to convince his readers that he is innocent – or at least
...more
John
We think of computer hackers as sitting in an isolated room, endlessly probing corporate and private networks from their screen. Actually, almost all deep hacking starts with the manipulation of people to do something that allows the hacker to move to the next level. The Art of Deception tells how Mitnick used "social engineering" skills to get people to unknowingly provide critical assistance, from simply being polite and opening a secure door to setting up restricted user accounts. Having read ...more
Gwanderson
Human's are like bad Microsoft coding.
Mary
Kevin Mitnick (whose teenage exploits were speculated at in the film War Games) describes himself not as a hacker, but a social engineer- one who is able to manipulate people and events through his knowledge of the inner workings of society. In this book, Mitnick describes many scenarios- some true, some hypothetical- including bank robbery, teenage break-ins, identity theft, and corporate espionage. In each scenario, we see how, with a couple of phone calls and a few simple questions, the attac ...more
Remo

Me crucé con este libro (está en la mula, por supuesto) y me lo he devorado en dos días. Hay una segunda parte, The Art of Intrusion, que parece que está incluso mejor.


Kevin Mitnick se hizo bastante famoso, para su desgracia, cuando le condenaron a unos cuantos años de cárcel por diversos delitos contra la seguridad electrónica de varias empresas y agencias estatales norteamericanas (nada grave según él, el holocausto informático según el fiscal). La Wikipedia (Kevin Mitnick, Kevin Mitnick ) cu

...more
Doug Vanderweide
This review has been hidden because it contains spoilers. To view it, click here.
Maarten Koller
This book enhanced my ‘social-engineering-awareness’ significantly and the ‘cons’ were great to read! Though I did feel bad sometimes for the conned people ;).
Sometimes the book feels dated though when talking about telephone system hackers and how they use the system for their own purposes, posing as an onsite engineer trying to get something fixed and enlisting the help of ‘colleagues’ at the phone company, because the stuff they are doing onsite is nowadays done remotely. Luckily what is done
...more
D.
This book addresses CEOs and other such people high up the corporate ladder. The book is full of sentences like "Is YOUR company safe from such attacks on your ignorant personnel?" (well, not exactly maybe... I've read the book half a year ago and this is from memory) and each time I read one of them I wanted to tear the book apart and punch the author in the face. There is also a complete chapter of nearly 100 pages which is pretty much a complete information security policy. It might be me, bu ...more
Riccardo
Mitnick has his own reputation, which sets a pretty high bar for the audience who already knows his story. Unfortunately, while he knows the material, his skills as an author are less high.
It is quite clear that Mitnick wishes the book to be viewed as an attempt at redemption.

The cons are easy to read and do offer some genuine insights but not all are believable. The supporting material discussing these scenarios is pretty weak.

There's a rigid format ("Analyzing the con," "Preventing the con," e
...more
Michelle Pod
This book has very interesting and useful information about social engineering, though it ultimately becomes repetitive. The stories of cons are interesting for about 100 pages, by page 250, Mitnick is basically rehashing the same story over and over. I had a hard time getting to the last section, which has some solid security advice but again, is information that has already been discussed. Basically, it could have been a great 150 page book but is instead an okay 350 page one.
Cooperglocker
A very interesting look into the ease at which one can bypass the most elaborate security system simply by asking. The book proves that it is too easy for a person to obtain almost anything, if they have the right information and ask the right person. I am a system security major, and work at a helpdesk of a very large financial corporation. The number of employees that call me and readily hand me their passwords without question is disturbing. I am a good person, and have no need for these pass ...more
Matt Bibby
Mar 02, 2013 Matt Bibby rated it 4 of 5 stars  ·  review of another edition
Recommends it for: Anyone interested in corporate security
Yet another interesting book by Kevin Mitnick. Found it very humorous that several of the stories he tells about social engineers under a false name are actually stories about himself. If you have already read his most recent book "Ghost in the Wires" you will pick up on this. However, if you have read that book and are expecting the same kind of story, you will be disappointed. This book is directed toward companies looking to improve their security. Although sometimes it does seem like he's gi ...more
Jack
A bit dated, but much is still relevant

Picked up this one to read about Social Engineering from a guy who used to wear a black hat. since it was written over 12 years ago, some of the technical stuff is not quite accurate, but the types of cons presented here in story from could still happen.
Michelle
Oct 03, 2008 Michelle rated it 4 of 5 stars  ·  review of another edition
Recommends it for: Anyone concerned about who has access to personal information
Comes off a little bit cocky at times, but that may be my take on it. Cocky or not, there is a lot of information between these pages that the public should be aware of for their own security. He is a genius who in high school managed to tap into the school's system to change a grade he didn't like... long story short, he wound up behind bars until the government hired him. (Guess we don't need to go there.) At any rate, he reveals some tactics people have used for identity theft, as well as rec ...more
Edin Ramić
As I started exploring and learning about social engineering I picked up this book and started reading it. When I started reading I wasn't expecting to learn so much things just from this one book. Mitnick covered social engineering in all aspects. So many different situations, policies, how to act as social engineer are all well written and explained. After reading this book in middle of it I even picked up his documentary movie and saw how he was a black sheep and how did they treated him unfa ...more
Ryan Draga
Fascinating read...a real wakeup call. Even if you know nothing about Social Engineering and Information Security, this book will interest you. In fact, I ESPECIALLY recommend this book to anyone who finds themselves constantly feeling intimidated or scared stiff at the idea of giving out sensitive information to ANYONE.

Knowledge is power and the best defense against the Social Engineer. So who better to learn defensive techniques from than the world's most infamous hacker and social engineer? M
...more
Jeff Yoak
This book is really creepy.

It serves as a how-to, and to a lesser extent a how-to-prevent, book on social engineering attacks. Most professionals in the industry understand that attacks are rarely purely technology-based. Much more often companies are compromised through a combination of human and computer vulnerabilities.

This book focuses on the human component of such attacks and is written from the perspective of someone who was extremely effective at executing such attacks. Though I was alre
...more
sillopillo
Non e' oro tutto cio' che luccica !
Libro decisamente interessante che utilizzando lo stile delle storie brevi propone un panorama molto vario di tecniche di ingegneria sociale in presa diretta da storie realmente accadute. Ha l'innegabile merito di aiutare a far luce, grazie alla competenza in materia dell'autore, delle tecniche utilizzate da chi con abilita' e mestiere riesce a modificare i comportamenti delle persone per i propri scopi. Tali pratiche da sempre potenzialmente dannose tendono ad
...more
Ralf Larisch
Ich besitze dieses Buch in der dt. Ausgabe "Die Kunst der Täuschung".
Soweit ich mich erinnere, in Deutschland, 2003 erschienen.
Kevin Mitnick, der in den 1980gern meist gesuchte "Hacker", seine Spezialität "Manipulation" von Menschen, Social Engineering.
Niranj
If you know who Kevin Mitnick is, and what he's accomplished, this book is a must. Probably the best book I've ever read on Social Engineering - in the current world, some of the exploits that the author describes could feel fairly outdated and basic - things such as tailgating, or even dumpster diving - but security starts at the very roots. The author does not go into details of how a particular flaw was exploited or how he gains access, but talks about how to secure the equipment physically - ...more
Russell
I found the most valuable sections in this book to be the policy recommendations and information security practices described in the last chapters (despite their age). The anecdotal and fictionalized scenarios were effective up to a point, but there are so many of them that it wore me down and I just started scanning them when I was about 3/4 of the way through. Mitnick's "messages" provided helpful suggestions and contextual gotchas interspersed with the social engineering/con situations, but t ...more
Jeff
Zzzzzzzzzz, Oh sorry..... This was a tough read. Very dry and if you've ever worked in a corporate environment, or IT at all, most of this is simply common sense.
Some of the 'examples' used are repeated in Kevin's other book, Ghost in the Wires, which I read before this one. GitW is a good read, this one, not so much.....
Kai Roer
In this book, Kevin Mitnic looks into the human aspect of information security by showing some examples, and then explaining what happend and why the approach worked.
The topic is very relevant, and IMO is likely to always be.
What I would've like to see more of is psycology and research on human behaviors. To me, this book states the obvious, without really digging into the mechanisms that drive people into the actions they take. It does go a way to explain, but the explanations are mainly base
...more
Joshua Dollins
Fascinating read all these years later I still recall parts of the book and the things I learned from it, highly recommended for those interested in human behavior and security.
D.L. Thurston
Some portions of this book haven't aged well. That's going to happen with any book that employs some level of technical information over the course of a dozen years. Some portions of this book likely weren't great to begin with. It's heavily weighted towards fictionalized examples of social engineering attacks to the point of feeling bloated. However, between those there is still some good information and some better insight.
Glenda
The "case studies" were great - very interesting with the focus on the human element in the various breakdowns in security (pretty much what the title says). What most of us see as some random piece of data may actually be only one piece in a puzzle for a social engineer working a scheme - fascinating really how they put it together.

The last 20% or so of the book is really a security policy of sorts - interesting enough if you need that kind of thing (what to do and not do) but a little less in
...more
Justin Garrison
Really disappointed in this book I loved Ghost in the Wire but this book is for corporate management, not enjoyment.
« previous 1 3 4 5 6 7 8 9 99 100 next »
topics  posts  views  last activity   
Goodreads Librari...: ISBN-13 9780471237129 2 18 Feb 04, 2012 06:39PM  
  • Secrets and Lies: Digital Security in a Networked World
  • Social Engineering: The Art of Human Hacking
  • The Fugitive Game: Online with Kevin Mitnick
  • Stealing the Network: How to Own the Box
  • Hacking: The Art of Exploitation
  • No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
  • Hacking Exposed: Network Security Secrets & Solutions, Fifth Edition
  • Hackers: Heroes of the Computer Revolution
  • Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
  • Stealing the Network: How to Own a Continent
  • Reversing: Secrets of Reverse Engineering
  • Practical Cryptography
  • Masters of Deception: The Gang That Ruled Cyberspace
  • The Hacker Crackdown: Law and Disorder on the Electronic Frontier
10953
Kevin Mitnick, the world's most famous (former) computer hacker, has been the subject of countless news and magazine articles, the idol of thousands of would-be hackers, and a one-time "most wanted" criminal of cyberspace, on the run from the bewildered Feds. Now a security consultant, he has spoken to audiences at conventions around the world, been on dozens of major national TV and radio shows, ...more
More about Kevin D. Mitnick...
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers Unauthorised Access: Physical Penetration Testing for IT Security Teams Hacker's Box : L'Art de la supercherie / Hacker's Guide Trojan Horse  (Jeff Aiken #2)

Share This Book