Kevin Mitnick is the founder of Defensive Thinking, an information security firm, L’art de la supercherie: Les révélations du plus célèbre hacker de la planète. Buy L’art de la supercherie by Kevin Mitnick, William-L Simon, Daniel Garance, Raymond Debonne (ISBN: ) from Amazon’s Book Store. Buy L’art de la supercherie by Kevin Mitnick, William-L Simon, Steve Wozniak, Daniel Garance, Raymond Debonne (ISBN: ) from Amazon’s.

Author: Tugami Fesho
Country: Haiti
Language: English (Spanish)
Genre: Marketing
Published (Last): 11 February 2010
Pages: 287
PDF File Size: 5.80 Mb
ePub File Size: 2.41 Mb
ISBN: 820-5-94955-195-9
Downloads: 83073
Price: Free* [*Free Regsitration Required]
Uploader: Mok

L’art De La Supercherie

Want to Read saving…. I did read his other book Ghost in the Wires and it was fantastic – in fact that’s the reason I superchere to buy this book.

All in all, an interesting book. Dans cet ouvrage, Kevin Mitnick vous propose de dcouvrir des scnarios ralistes d arnaques et d escroqueries, tous bass sur l art de la persuasion et de la manipulation. For security officers of a company it is a must-read though, or better yet, the practices should be immediately implemented as none of the cons would have stood a chance if companies had used them. Ce que les membres d’Audible en pensent Notations Global.

Cecilia Dunbar Hernandez rated it it was amazing Oct 09, It’s too bad they didn’t use the same narrator from Ghost in the Wires – that narrator really had Mitnick down pat. I suspect that if you’re reading for entertainment, then you probably want Mitnick’s The Art of Intrusion or Ghost in the Wires instead.

No trivia or quizzes yet. John Randel marked it as to-read Sep 14, There are entertaining stories throughout the book The Art of Deception is a book written by the notorious hacker of the s Kevin Mitnick who came to fame after a nationwide manhunt ending with his arrest in View all 3 comments.

The last chunk of the book is just lists and simple paragraphs of kind of boring now-cliche advice that those working in security should know by heart. The narrator was just soooo boring – it was like he was reading a text book. Zur Kritik Der Materialistischen Geschichtsauffassung by Hollitscher, Jakob, the canonical probability distribution, the partition function, and the chemical potential.


When I recently had to take an online training class at work about social engineers trying to trick you into giving up valuable proprietary information, there were cute little video segments featuring my old friend Kevin. If he was ever on the dark side, he is no longer there.

Hacker’s Box : L’Art de la supercherie / Hacker’s Guide

Kevin Mitnick, William L. Quotes from The Art of Decept Uspercherie la fois du point de vue de l attaquant et de la victime, L art de la supercherie explique pourquoi certaines attaques par impostures russissent, et indique comment elles auraient pu tre djoues. Preview — Hacker’s Box by Kevin D.

Taking an example from the book. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information dd are to a slick con artist impersonating an IRS agent.

Autumn Smith — L’art De La Supercherie [French] by Kevin Mitnick,

This book is not yet featured on Listopia. Return to Book Page. Christopher rated it really liked it Sep 07, Just a moment while we sign you in to your Goodreads account. The modus operandi in all the cases is very similar: You can sometimes get this information by pretending you’re writing a book on the topic and just ask for it. The world’s most infamous hacker offers an insider’s view of the aupercherie threats to high-tech security Kevin Mitnick’s exploits as a cyber-desperado and fugitive form one of the mutnick exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries.

Rai Mubashar marked it as to-read Oct 20, Alex Bakos rated it it was amazing Mar 24, I found the most valuable sections in this book to be the policy recommendations and kevln security practices described in the last chapters despite their age. John marked it as to-read Jan 27, Oh, and there is some good advice on not downloading unusual email attachments.

That receptionist will provide information that a manager could use, and suddenly Gary in accounting needs to send over the latest financial projections STAT. With the help of many fascinating true stories of sueprcherie attacks on business and government, he eupercherie just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent.


Now a security consultant, he has spoken to audiences at conventions around the world, been on dozens of major national TV and krvin shows, Kevin Mitnick, the world’s most famous former computer hacker, has been the subject of countless news and magazine articles, the idol of thousands of would-be hackers, and a one-time “most wanted” criminal of cyberspace, on the run from the bewildered Feds. An interesting book about social engineering and hacking.

Hacker’s Box : L’Art de la supercherie / Hacker’s Guide by Kevin D. Mitnick

It becomes an undergrad textbook, basically. Amanone added it Oct 07, I read this second and don’t have a role in the company’s security, so this book was a let down. It doesn’t matter how sophisticated your technologically amazing security systems are, gullible super-friendly happy-to-help human beings are mitnickk your weakest link.

The book seems to be written for a reader with absolutely no technical knowledge and painstakingly explains even the most basic computer terminology. But anyway, as long as you use a computer, you’ll most likely be fine reading it! Trivia About The Art of Decept Published by CampusPress: Goodreads helps superchdrie keep track of books you want to read.

Mitnick strongly advocates continuously training staff to be vigilant and avoid the traps that ls con-men can set. Hosselet rated it liked it Mar 15, To see what your friends thought of this book, please sign up.

Amazingly, most of the techniques involve cracking the “people” rather than cracking the “code.

Imen Tulip marked it as to-read Mar 29,