Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Google Book Preview
The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick at Abbey's Bookshop,

The Art of Deception: Controlling the Human Element of Security

Kevin D. Mitnick William L. Simon Steve Wozniak



Society & Social Sciences;
Privacy & data protection;
Data encryption;
Network security


368 pages

We can order this in for you
How long will it take?
order qty:  
Add this item to my basket

Truly, the greatest vulnerability in protecting the business assets of any company often lies with the company?s own employees. Although corporations go to great lengths to install state of the art systems, they continue to ignore the human element of information security. Without proper training and security procedures, employees are highly susceptible to what are called ?social engineering? attacks that lead them to unwittingly open doors within the organization, both in the literal sense and the information technology sense. The author, Kevin Mitnick, is arguably the world?s most infamous hacker who has turned his life around and now is much sought after by industry and corporations worldwide as the expert on preventing security breaches. There is no one on the planet who has more experience with ?social engineering? techniques, and no one who is better able to advise on how these kind of attacks are carried out and can be prevented.

By:   Kevin D. Mitnick, William L. Simon
Foreword by:   Steve Wozniak
Imprint:   Wiley
Country of Publication:   United States
Edition:   New edition
Dimensions:   Height: 231mm,  Width: 152mm,  Spine: 25mm
Weight:   433g
ISBN:   9780764542800
ISBN 10:   076454280X
Pages:   368
Publication Date:   October 2003
Audience:   Professional and scholarly ,  Undergraduate
Format:   Paperback
Publisher's Status:   Active

Foreword.Preface.Introduction.Part 1: Behind the Scenes.Chapter 1: Security's Weakest Link.Part 2: The Art of the Attacker.Chapter 2: When Innocuous Information Isn't.Chapter 3: The Direct Attack: Just Asking for It.Chapter 4: Building Trust.Chapter 5: "Let Me Help You".Chapter 6: "Can You Help Me?".Chapter 7: Phony Sites and Dangerous Attachments.Chapter 8: Using Sympathy, Guilt, and Intimidation.Chapter 9: The Reverse Sting.Part 3: Intruder Alert.Chapter 10: Entering the Premises.Chapter 11: Combining Technology and Social Engineering.Chapter 12: Attacks on the Entry-Level Employee.Chapter 13: Clever Cons.Chapter 14: Industrial Espionage.Part 4: Raising the Bar.Chapter 15: Information Security Awareness and Training.Chapter 16: Recommended Corporate Information Security Policies.Security at a Glance.Sources.Acknowledgments.Index.

Kevin Mitnick is the founder of Defensive Thinking, an information security firm, and speaks widely on security issues. He has appeared on 60 Minutes and elsewhere in the media, and his exploits have spawned several bestselling books, including The Fugitive Game. William Simon is the bestselling author of more than twenty books.

a fascinating read (ForTean Times, June 2004) ...a lot of interesting cautionary tales... (New Scientist, January 2004)

Your cart does not contain any items.