Regular price: $20.72

Free with 30-day trial
Membership details Membership details
  • A 30-day trial plus your first audiobook, free
  • 1 credit/month after trial – good for any book, any price
  • Easy exchanges – swap any book you don’t love
  • Keep your audiobooks, even if you cancel
  • After your trial, Audible is just $14.95/month
Select or Add a new payment method

Buy Now with 1 Credit

By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Buy Now for $20.72

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's Summary

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
©2003 Kevin D. Mitnick; (P)2009 Audible, Inc.
Show More Show Less

Customer Reviews

Most Helpful

By Mike on 08-06-12

Poor Narrator - ZZZZZzzzzzzz!

Would you say that listening to this book was time well-spent? Why or why not?

This is the first book I have ever stopped listening to before finishing. The narrator was just soooo boring - it was like he was reading a text book.

Would you be willing to try another book from Kevin Mitnick? Why or why not?

I did read his other book Ghost in the Wires and it was fantastic - in fact that's the reason I decided to buy this book.

How did the narrator detract from the book?

He was very, very monotone and boring. No excitement or inflection in his voice at points where there clearly should have been.

Did The Art of Deception inspire you to do anything?

Yes - listen to a different book - any other book.

Any additional comments?

It's too bad they didn't use the same narrator from Ghost in the Wires - that narrator really had Mitnick down pat.

Read More Hide me

23 of 23 people found this review helpful


By Dan on 10-04-10

memory lane

This book is a fun read (listen) with story after story mostly about how people get tricked into giving up passwords or dial up modem numbers. Some of the tricks would still work, but most would not in modern enterprises. This book does not come close to fully describing a modern threat landscape. I work in InfoSec, and found this to be an excellent history lesson, with a few instances and situations where the human element of security threats still exist, such as the types of scams run to gain physical access.

Read More Hide me

9 of 9 people found this review helpful

See all Reviews

Customer Reviews

Most Helpful

By Mr. S. Riley on 02-10-10

interesting but repetitive...

I was expecting more from this book but I have a background in IT Security and maybe that clouded my judgement. The target audience is not the InfoSec community but middle management.

The books contained many simplistic examples, with a few teases of information around potential social engineering resources (mainly US examples) but started to get very repetitive offering only high level solutions (e.g. have a security policy).

My advice - Once you've read the first few chapters you can put this book down and get on with your life. The book serves a purpose to highlight to the clueless how easily you can be convinced to part with information but I would imagine it would start to feel like a broken record to most readers.

Read More Hide me

3 of 3 people found this review helpful


By Trevor on 09-07-16

Interesting Read

If you are going to read something, the pick the other title, Ghost in the Wires. That is absolutely excellent where as this by comparison is a sanitised version. The first half of the book is quite interesting with lots of examples of social engineers in action, but you are left thinking that they are all engineered stories. I did spot a few that were listed in Ghost in the Wires, but others seem manufactured to make a point. The second half of the book is largely missable. Had it been a book, I don't think I'd have got past the 75% mark as its a list of policies designed for operations and security teams to sure up their systems. Yes there's a place for it, and perhaps when this book was written it was groundbreaking stuff, but the narration is so monotone its hard going. I bought this one based solely on how good Ghost in the Wires is. My advice, read that one, it has all this and more.

Read More Hide me

1 of 1 people found this review helpful

See all Reviews