The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security K evin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."

Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

No-Tech hacking is all about showing how bad guys can defeat the best high-tech security systems without using technology. In most cases, we present completely no-tech attacks (some of which don’t even require that a bad guy touch anything) while in others we present simple, uncomplicated “low-tech” attacks that require hardly any technical skill. The book is jam-packed with photos of real-world attacks and examples from every day life. Seeing life through the eyes of myself and a few trusted friends, you’ll come to understand just how frighteningly gifted an attacker can be when he leverages the simple power of observation.

Originally subtitled A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, this book goes well beyond these techniques, letting you in on vehicle surveillance, peer-to-peer hacking, Google hacking, shoulder surfing, people watching, kiosk hacking and more. Whether you’re concerned about protecting you corporate network or guarding against identity theft, I’ve made sure that this book is easy-to-read, fun and informative without blowing your mind with technical jargon.

Analyst's Style Manual

The Mercyhurst College Institute for Intelligence Studies (MCIIS) has developed a style manual for analysts to assist student analysts with the many perplexing and complex rules to follow when producing written intelligence products.

The MCIIS Press developed this manual in large part from the CIA Writing Manual, updating some sections and modifying some others. This manual also draws on the U.S. Army’s Military Writing Reference Book for additional rules and guidelines regarding clear, concise writing. The final component in this manual, the MCIIS Style Sheet, reflects best practices in formatting a written product, as determined by MCIIS research.