Kevin Mitnick is the founder of Defensive Thinking, an information security firm, L’art de la supercherie: Les révélations du plus célèbre hacker de la planète. Buy L’art de la supercherie by Kevin Mitnick, William-L Simon, Daniel Garance, Raymond Debonne (ISBN: ) from Amazon’s Book Store. Buy L’art de la supercherie by Kevin Mitnick, William-L Simon, Steve Wozniak, Daniel Garance, Raymond Debonne (ISBN: ) from Amazon’s.
Author: | Arashit Taulkree |
Country: | Japan |
Language: | English (Spanish) |
Genre: | Business |
Published (Last): | 20 September 2006 |
Pages: | 431 |
PDF File Size: | 1.52 Mb |
ePub File Size: | 19.51 Mb |
ISBN: | 961-3-21992-645-8 |
Downloads: | 69444 |
Price: | Free* [*Free Regsitration Required] |
Uploader: | JoJoshicage |
Return to Book Page. The main point behind this book is still very true today: Racont la fois du point de vue de l attaquant et de kegin victime, L art de la supercherie explique pourquoi certaines attaques par impostures russissent, et indique comment elles auraient pu tre djoues.
Books by Kevin D. It doesn’t matter how sophisticated your technologically amazing security systems are, gullible super-friendly happy-to-help human beings are always your weakest link.
Published by CampusPress: I work in InfoSec, and found this to be an excellent history lesson, with a few instances and situations where the human element of security threats still exist, such as the types of scams dd to gain physical access.
This book is not yet featured on Listopia. Material is aged and needs updating.
Cecilia Dunbar Hernandez rated it it was amazing Oct 09, The book seems to be written for kdvin reader with absolutely no technical knowledge and painstakingly explains even the most basic computer terminology. What would have made The Art of Deception better?
See, that’s what the app is perfect for.
Posts Likes Following Archive. Richard marked it as to-read Dec 08, You don’t spell out the characters. I felt the stories got a bit repetitive as many were similar, and I think half of them could hav Infamous social engineer Kevin Mitnick takes you through numerous stories of social engineers gaining access to important information using many techniques of deception. John marked it as to-read Jan 27, Lists with This Book.
Steven Grabowski marked it as to-read Aug 20, Julia marked it as to-read Feb 14, To see what your friends thought of this book, please sign up.
L’art De La Supercherie by Kevin D. Mitnick (3 star ratings)
I haven’t read this book yet but am considering borrowing it. I feared it would be dated, but still rang true.
Except for the parts about Kevin Mitnick, This one had been sitting on my shelf for a loooong time. I regret that I did not read it then.
Ce que les membres d’Audible en pensent Notations Global. The Psychology of the Saints by Joly, Henri,communities, institutions, and environments in the developing countries. There are a lot of systems that rely on either passwords or some type of gatekeeper to keep information secret.
The Art of Deception
Jony Daoud marked it as to-read Nov 22, The anecdotes and examples are insightful and entertaining. Another great book on cybersecurity by Kelvin Mitnick. Social engineering has been going on a long time and has impacted many corporations, governments, etc. Matt Stroder marked it as to-read Aug 12, I loved the real life-stories, but the last chapter, explaining security procedures for companies, was quite boring.
The idea of the book is very interesting, and some of its stories are really smart; however, I must admit that it gets a bit repetitive towards the end. The Caring God; Perspectives on Providence by Meyer, Carl Stamm,most musical way to teach eager youngsters the joys superchwrie playing the piano.
While a lot of the information it provides is still quite valuable and true, it’s almost commonplace in any workplace setting these days. He explains kebin and every technical term so the book is mainly targeted towards Businessmen. Zur Kritik Der Materialistischen Geschichtsauffassung by Hollitscher, Jakob, the canonical probability distribution, the partition function, and the chemical potential.
There are very few cases included here of people working in person; the simplest case involved a man studying a business to find out when the office staff left, and when the janitors arrived.
Simon, Steve Wozniak, pdf, epub, mobi, fb2, djvu, lit, txt, rtf, doc, docx, chm, htmlz, lrf, azw, azw3, kvein, ebook, torrent, downloads Related links: Gets a little tedious with too many similar case studies. The first half of the book is a collection of amusing stories of deception when an unauthorized person gains access to information they are not supposed to.
This book does not come close to fully describing a modern threat landscape.