Goodreads helps you keep track of books you want to read.
Start by marking “Umění klamu” as Want to Read:
Umění klamu
Enlarge cover
Rate this book
Clear rating
Open Preview

Umění klamu

3.76  ·  Rating details ·  4,541 Ratings  ·  261 Reviews
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling "The Art of Deception"
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studi
...more
Hardcover, 348 pages
Published September 25th 2003 by Helion (first published January 1st 2001)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.
This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30)
Rating details
Sort: Default
|
Filter
David
Mar 06, 2008 rated it really liked it  ·  review of another edition
Shelves: read-in-2008
Kevin Mitnick, probably the most famous (and controversial) computer hacker of the 1990's, has spent several years of his life on the run, as well as a few years in jail. For years after leaving prison he was forbidden to log on to a computer, a prohibition he appealed successfully. He now runs a computer security business, lectures to large corporations, and has co-authored two books on computer network security.

This book focuses on the human element of computer security. Reminding us that eve
...more
Rod Hilton
Sep 26, 2008 rated it did not like it  ·  review of another edition
The Art of Deception is one of two books by famous hacker Kevin Mitnick, the other being "The Art of Intrusion". Intrusion focuses primarily on physical or technological hacks, while this book focuses almost exclusively on social engineering attacks.

A number of problems prevented this book from being very good. The main problem is simply that Mitnick did not have enough material to fill an entire book. This book would have been better if it were shorter and simply one section in a larger book ab
...more
Pramod Nair
I went to prison for my hacking. Now people hire me to do the same things I went to prison for, but in a legal and beneficial way.” – Kevin D. Mitnick, Ghost in the Wires: My Adventures as the World's Most Wanted Hacker.

Reading ‘The Art of Deception’ is like hearing it straight from the horse's mouth. Kevin D. Mitnick, one of the legendary cyber desperado turned computer security consultant, takes the reader into the complex, supremely confident – often misunderstood as arrogance and curiosity
...more
Atila Iamarino
Um bom livro sobre aquele hacking moleque, aquele hacking arte, que era muito praticado antigamente. Boas histórias de como os melhores sistemas de segurança podem ser burlados com algumas ligações ou uma busca no lixo. Ele passa por algumas noções de programas e cyberataques (em muito menos detalhes do que o Social Engineering: The Art of Human Hacking), mas a maior parte do hacking que ele descreve é feita com saliva e astúcia.

Não é um livro tão útil atualmente, especialmente com as mudanças d
...more
John
Aug 26, 2011 rated it really liked it  ·  review of another edition
Shelves: read-non-fiction
We think of computer hackers as sitting in an isolated room, endlessly probing corporate and private networks from their screen. Actually, almost all deep hacking starts with the manipulation of people to do something that allows the hacker to move to the next level. The Art of Deception tells how Mitnick used "social engineering" skills to get people to unknowingly provide critical assistance, from simply being polite and opening a secure door to setting up restricted user accounts. Having read ...more
Derek
Dec 22, 2013 rated it liked it  ·  review of another edition
I suspect that if you're reading for entertainment, then you probably want Mitnick's The Art of Intrusion or Ghost in the Wires instead. This book is split 2/3 and 1/3 between a series of fictionalized anecdotes--based on or representative of real incidents--and a corporate policy guide. The guide, like all such specifications, is deadly dry and would require several readings and much thought to fully internalize.

The anecdotes are more interesting than entertaining, and all proceed by the same b
...more
James
Oct 26, 2016 rated it liked it  ·  review of another edition
So ... Interesting read. Social engineering has been going on a long time and has impacted many corporations, governments, etc. I felt this book did a great job documenting examples of what has taken place as well as provided insights for what you and your organization can do to help prevent, the best that you can, social engineering attacks.

This book definitely irritated me as I had not thought about the detailed level of attacks folks have gone through. Thinking back, there have probably been
...more
Gwanderson
Apr 08, 2008 rated it really liked it  ·  review of another edition
Human's are like bad Microsoft coding.
Kökten Birant
Aug 15, 2017 rated it it was amazing  ·  review of another edition
Eğlenceli ve en önemlisi de gerçek... Kesinlikle teknik ve zorlayıcı karmaşık değil. Herkes Hacker olabilir, yeter ki biraz kafası çalışsın seviyesinde anlatıyor... Özellikle olay anlatımları çok başarılı...
Tomáš
Kéž bych knížku četl před 15 lety, bylo by to minimálně o hvězdu víc. Z věcného hlediska jsem se moc nového nedozvěděl. Éra faxů a pevných linek je již pryč. A kdo sleduje seriál Mr.Robot, ví svý ;-) Z hlediska bezpečnosti je ale podle mě situace ještě horší než před lety - přibývá technologických vymožeností a s každou i nové druhy zranitelností a útoků. Největší slabinou ale stále zůstáváme my, lidé, a proto je knížka stále aktuální a důležitá.
Remo
Mar 04, 2012 rated it really liked it  ·  review of another edition
Shelves: informatica, 2007

Me crucé con este libro (está en la mula, por supuesto) y me lo he devorado en dos días. Hay una segunda parte, The Art of Intrusion, que parece que está incluso mejor.


Kevin Mitnick se hizo bastante famoso, para su desgracia, cuando le condenaron a unos cuantos años de cárcel por diversos delitos contra la seguridad electrónica de varias empresas y agencias estatales norteamericanas (nada grave según él, el holocausto informático según el fiscal). La Wikipedia (Kevin Mitnick, Kevin Mitnick ) cu

...more
Khalid
Jun 22, 2007 rated it liked it  ·  review of another edition
Shelves: already-read
In The Art of Deception, [Kevin Mitnick] discusses the thing he's best at: Social Engineering. Social engineering is the term used in computer security to describe the manipulation of humans in order to break through a security barrier, and is sometimes referred to as hacking the mind.

In the first chapter of his book, usually referred to as The Lost Chapter (As it wasn't published with the final version of the book), Kevin Mitnick tries to convince his readers that he is innocent – or at least
...more
Koen Crolla
Almost all of this book consists of infinitesimal variations on the same point, communicated through accounts of apparently real events fictionalised by someone who clearly desperately wanted to write short stories instead of ghost-writing for minor celebrities but couldn't find a publisher for them. That every story reads like a bad (and I mean bad) noir film isn't just annoying; it makes them much less credible.
It's clear that Mitnick thinks very highly of himself and his accomplishments, occa
...more
Phan
Jan 22, 2016 rated it really liked it  ·  review of another edition
Kevin D. Mitnick - a former hacker turned security expert - gives an excellent view on security threats posed by human factor in modern world.

The common sense that computer geeks are often fat, unpopular with heavy glasses and nerdy faces is not applicable in "Social Engineer" category. Social engineer is someone with talent and understanding for both social behavior and technical command. He/she can infiltrate in a company system by manipulating human psychology (unshakeable confidence, empat
...more
G.M. Lupo
Mar 01, 2015 rated it really liked it  ·  review of another edition
Kevin Mitnick is probably best known for being a phone phreak and fugitive computer hacker in the late-80s and early 90s, who was the focus of a considerable manhunt. Following his capture and time in prison, he's become an Internet security consultant and turned his talents to helping people avoid the sort of hacks he became famous for perpetrating. This book is a chronicle of numerous social engineering attacks, some hypothetical, some based on real-world examples (which may or may not have be ...more
Russell
I found the most valuable sections in this book to be the policy recommendations and information security practices described in the last chapters (despite their age). The anecdotal and fictionalized scenarios were effective up to a point, but there are so many of them that it wore me down and I just started scanning them when I was about 3/4 of the way through. Mitnick's "messages" provided helpful suggestions and contextual gotchas interspersed with the social engineering/con situations, but t ...more
Azamali
Feb 24, 2012 rated it really liked it  ·  review of another edition

Table of Contents


Part 1 Behind the Scenes
Chapter 1 Security's Weakest Link



Part 2 The Art of the Attacker

Chapter 2 When Innocuous Information Isn't
Chapter 3 The Direct Attack: Just Asking for it
Chapter 4 Building Trust
Chapter 5 "Let Me Help You"
Chapter 6 "Can You Help Me?"
Chapter 7 Phony Sites and Dangerous Attachments
Chapter 8 Using Sympathy, Guilt and Intimidation
Chapter 9 The Reverse Sting



Part 3 Intruder Alert

Chapter 10 Entering the Premises
Chapter 11 Combining Technology and Social Eng
...more
Jeff
Jul 30, 2014 rated it did not like it  ·  review of another edition
Zzzzzzzzzz, Oh sorry..... This was a tough read. Very dry and if you've ever worked in a corporate environment, or IT at all, most of this is simply common sense.
Some of the 'examples' used are repeated in Kevin's other book, Ghost in the Wires, which I read before this one. GitW is a good read, this one, not so much.....
Stefan
Jul 07, 2010 rated it it was ok  ·  review of another edition
While the book demonstrates the basic concept of social engineering quite well, it would never have got so much attention if Mitnick's name wasn't on the cover. It's okay, but it's not extraordinary.
Stephen
Aug 20, 2017 rated it liked it  ·  review of another edition
Shelves: security
Interesting at first, but very repetitive. Mitnick, who claims his career as a hacker was passed solely on manipulating people to gain information and access, shares stories of others who did the same. These mostly include private investigators, with at least one pair of curious teenagers and a few bits of corporate espionage. The modus operandi in all the cases is very similar: the actor engages in background research to learn a few names and some of the lingo of the business, then makes phone ...more
Aron
Jun 22, 2017 rated it did not like it  ·  review of another edition
As the title suggests, the focus of this book is social engineering-based security threats. While I think it's generally accepted that this is the least controllable and therefore weakest element of security, if you're wondering how this ballooned into 350 pages...well, I am, too. The summary of pretty much every story in every chapter is "be sure to conclusively verify the identity of anyone you're giving information to."

While I picked this up completely voluntarily, reading it was a chore. It
...more
stefanddddddd
nice overview of techniques used in social engineering. unfortunately, the last part of the book transforms into a user manual for security consultants, while claiming it should not be used as such because it is a novel after all. could have been replaced with a few more interesting stories from the field.
Michelle Tran
Sep 23, 2017 rated it it was ok  ·  review of another edition
Shelves: abandoned
This book annoyed me because the main takeaway seems to be "TRUST NOBODY". Although it is interesting to see the ways we can take advantage of human trust, I feel like there was too much veneration of attackers and how awesome they are for taking advantage of people trying to be helpful.

I'm abandoning this book because it as many of the examples are quite dated.
Arushit Mudgal
The book talks about Social-Engineering but get repetitive, Mitnick tells the same story by changing few not important elements. He explains each and every technical term so the book is mainly targeted towards Businessmen
Allisonperkel
Aug 04, 2017 rated it did not like it  ·  review of another edition
Shelves: tech, non-fiction
The cardinal sin is padding out an shorter book and making it 3x the size is very much at play here. The book is boring. The book is out of date - though some of the cons described are still going on. Others ... not so much.

Really, just not good. I ended up skimming the last 2 chapters.
Ginc Zivers
May 04, 2017 rated it really liked it  ·  review of another edition
Great book about social engeniers, we always tend to forgwt about. Strong passwords and secure network is nothing when you have the weak link - human. Good book to understand how they work and how they might get what they want. Every company neads to have these rules set. It is very important.
Scott
Feb 01, 2017 rated it it was amazing  ·  review of another edition
Shelves: technology
First read this as a text book for a class on computer Security and Network Forensics. Great read on how most computer breaches happen not by actual hacking but by social engineering

I would recommend this for anyone wanting to learn more about hacking
Jules
Jan 17, 2017 rated it really liked it  ·  review of another edition
Will change what you think a hacker is (or 'was' actually, because this book has a nice flavour of the 90's): Much less coding than expected, much more phone calls and acting. Interesting!
Nidhal Ben Tahar
Disappointing. Kevin the security consultant, not Kevin the hacker, wrote it. Books about governance and security best practices were very low in my reading list, but after this one they's out of it.
Davi
Jun 23, 2017 rated it really liked it  ·  review of another edition
Ótimo livro para aprender sobre ataques de engenharia social, mas a parte que fala como se proteger deles está desatualizada para os padrões atuais.
« previous 1 3 4 5 6 7 8 9 next »
topics  posts  views  last activity   
Goodreads Librari...: ISBN-13 9780471237129 2 21 Feb 04, 2012 06:39PM  
  • No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
  • Secrets and Lies: Digital Security in a Networked World
  • The Fugitive Game: Online with Kevin Mitnick
  • Stealing the Network: How to Own the Box
  • Social Engineering: The Art of Human Hacking
  • Hacking Exposed: Network Security Secrets & Solutions
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • Stealing the Network: How to Own an Identity
  • Practical Cryptography
  • Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • Security Engineering: A Guide to Building Dependable Distributed Systems
  • Hacking: The Art of Exploitation
  • Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
  • The Hacker Crackdown: Law and Disorder on the Electronic Frontier
  • Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • The Hacker Ethic: A Radical Approach to the Philosophy of Business

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »
10953
Kevin Mitnick, the world's most famous (former) computer hacker, has been the subject of countless news and magazine articles, the idol of thousands of would-be hackers, and a one-time "most wanted" criminal of cyberspace, on the run from the bewildered Feds. Now a security consultant, he has spoken to audiences at conventions around the world, been on dozens of major national TV and radio shows, ...more
More about Kevin D. Mitnick...
“One noted software libertarian, Richard Stallman, even refused to protect his account with a password.” 3 likes
“Anyone who thinks that security products alone offer true security is settling for the illusion of security.” 1 likes
More quotes…