Listen free for 30 days
-
The Art of Deception
- Controlling the Human Element of Security
- Narrated by: Nick Sullivan
- Length: 13 hrs and 41 mins
Add to Cart failed.
Add to Wish List failed.
Remove from wish list failed.
Follow podcast failed
Unfollow podcast failed
Buy Now for $25.97
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Buy it with
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Written by: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Good book but
- By Mr. C on 2018-02-27
Written by: Kevin Mitnick
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Written by: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
wow
- By jesse b on 2022-05-20
Written by: Kevin Mitnick, and others
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Written by: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
Written by: Christopher Hadnagy
-
Permanent Record
- Written by: Edward Snowden
- Narrated by: Holter Graham
- Length: 11 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Just Magnificent
- By Nate on 2019-09-27
Written by: Edward Snowden
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Written by: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it. In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen.
-
-
An alarming review of the current cyber threat landscape
- By Amazon Customer on 2021-04-22
Written by: Andy Greenberg
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Written by: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
Engaging, thrilling
- By Chris Burchett on 2023-01-20
Written by: Cliff Stoll
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Written by: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Good book but
- By Mr. C on 2018-02-27
Written by: Kevin Mitnick
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Written by: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
wow
- By jesse b on 2022-05-20
Written by: Kevin Mitnick, and others
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Written by: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
Written by: Christopher Hadnagy
-
Permanent Record
- Written by: Edward Snowden
- Narrated by: Holter Graham
- Length: 11 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Just Magnificent
- By Nate on 2019-09-27
Written by: Edward Snowden
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Written by: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it. In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen.
-
-
An alarming review of the current cyber threat landscape
- By Amazon Customer on 2021-04-22
Written by: Andy Greenberg
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Written by: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
Engaging, thrilling
- By Chris Burchett on 2023-01-20
Written by: Cliff Stoll
-
Social Engineering
- The Art of Human Hacking
- Written by: Paul Wilson - foreword, Christopher Hadnagy
- Narrated by: A. T. Chandler
- Length: 14 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides.
Written by: Paul Wilson - foreword, and others
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- Written by: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Nothing about Kali Linux
- By Anonymous User on 2020-01-11
Written by: Lance Henderson
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- Written by: Phillip L. Wylie, Kim Crawley
- Narrated by: Matthew Josdal
- Length: 6 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
Written by: Phillip L. Wylie, and others
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Written by: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Hard to get into
- By Blair C. on 2019-11-06
Written by: Joseph Menn
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- Written by: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Essential
- By AW on 2022-11-11
Written by: Nicole Perlroth
-
The Prince
- Written by: Niccolo Machiavelli
- Narrated by: Grover Gardner
- Length: 4 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
From his perspective in Renaissance Italy, Machiavelli's aim in this classic work was to resolve conflict with the ruling prince, Lorenzo de Medici. Machiavelli based his insights on the way people really are rather than an ideal of how they should be. This is the world's most famous master plan for seizing and holding power. Astonishing in its candor The Prince even today remains a disturbingly realistic and prophetic work on what it takes to be a prince, a king, or a president.
Written by: Niccolo Machiavelli
Publisher's Summary
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent.
Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.
More from the same
What listeners say about The Art of Deception
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story

- James S.
- 2021-02-01
Good security device delivered by old misogynist
Mr. Minnick may know his IT security but makes clear in his book that he doesn't think women can be hackers and that the only time they can be social engineers is if they seduce people. Cringed throughout.
13 people found this helpful
-
Overall
-
Performance
-
Story

- Anonymous User
- 2020-12-27
Stories of deception and how to prevent them
The book contains very interesting stories of how People steal information from big and small businesses. It goes over the steps the saboteurs take and how they think in great detail. The final chapters van be skipped for a non professional reader as it details how to form trainings on these topics.
3 people found this helpful
-
Overall
-
Performance
-
Story

- Abdelrahman Samy
- 2020-10-07
A must read for any one in the cybersecurity indus
A lot of useful information and ready for you policies to apply in your company. A highly recommended book.
3 people found this helpful
-
Overall
-
Performance
-
Story

- Frank
- 2022-03-23
Not bad
Not bad information. It could’ve been shortened by a few hours, though. Seems like he repeated himself several times.
1 person found this helpful
-
Overall
-
Performance
-
Story

- Dominic
- 2023-01-24
dated, old, needs a rewrite for the 21st century.
I am a fan of the author's work but this was written along time ago and half of it really isn't plausible in 2023. The millennials are a lot more savvy and won't be manipulated with much of the methods described here. I know this as a late boomer still hanging on to my infosec career in 2023. today's computer users can be social engineered but you will need more sophisticated scams, not what you read here.
Think of this book as a time capsule of social manipulation techniques pre 9/11.