// Comparison
Foundations of Information Security vs The Art of Deception: Which Should You Read?
Two cybersecurity books on Foundations, compared honestly: who each is for, what each does best, and which to read first.
Jason Andress' compact tour of the field: confidentiality / integrity / availability, identification and authentication, network and OS controls, written for newcomers and adjacent disciplines.
Controlling the Human Element of Security
Kevin Mitnick, William L. Simon
Kevin Mitnick and William Simon's case-study collection of social-engineering attacks: PBX scams, helpdesk impersonation, dumpster-diving, the casual lies that sound true. The technology dates the book; the human side is timeless.
Read this if
Skip this if
Key takeaways
- Covers every major domain of security at survey-level depth, which is exactly what a beginner needs to choose a specialization.
- The operations security chapter is unusually strong for an intro book; most authors skip it because it's unsexy, Andress doesn't.
- Pairs naturally with one or two deep-dive books per topic from this catalog; treat it as the master index.
- Most successful pretexts are not lies; they are partial truths weighted toward what the target already wants to do.
- Helpdesks, third-party vendors, and after-hours staff are still the structural weak points the book identifies — twenty years later, with new technology stacks but the same failure modes.
- Awareness training built around Mitnick's archetypes outperforms generic phishing-click-rate metrics; the book is the textbook for that approach.
How they compare
Foundations of Information Security and The Art of Deception are both rated 4/5 in our catalog. Pick by topic preference and reading style rather than by rating.
Both books target beginner-level readers, so the choice is about topic, not difficulty.
Foundations of Information Security and The Art of Deception both cover Foundations, so reading them in sequence reinforces the same material from different angles.
Keep reading
Foundations of Information Security
→ Alternatives to Foundations of Information Security→ What to read after Foundations of Information Security