// Prerequisites

What to read before The Art of Deception

If The Art of Deception feels too steep at beginner level, here is what to read first. Lighter books in the same topics that build the prerequisites this one assumes.

  1. 01 · 2011

    Ghost in the Wires

    Kevin Mitnick's first-person account of his 1990s social-engineering and phone-system intrusions, foreword by Steve Wozniak. Self-promotional in tone but a primary source on a defining era.

    Beginner
    4/5Kevin Mitnick, William L. Simon
  2. 02 · 2019

    Foundations of Information Security

    Jason Andress' compact tour of the field: confidentiality / integrity / availability, identification and authentication, network and OS controls, written for newcomers and adjacent disciplines.

    Beginner
    4/5Jason Andress
  3. 03 · 2021

    How Cybersecurity Really Works

    Sam Grubb's gentle, exercise-driven introduction for non-specialists who need a working mental model of attacker behaviour and basic defence.

    Beginner
    4/5Sam Grubb
  4. 04 · 2018

    Social Engineering

    Christopher Hadnagy's broad procedural reference on social engineering as a discipline — recon, pretexting, elicitation, microexpressions, and the structured engagement model his consultancy operationalized.

    Intermediate
    4/5Christopher Hadnagy
  5. 05 · 2011

    Kingpin

    Kevin Poulsen's reconstruction of Max Butler's career — from white-hat consultant to running CardersMarket, the carding forum that consolidated the early-2000s underground — and the FBI investigation that finally took him down.

    Beginner
    5/5Kevin Poulsen
  6. 06 · 2019

    Sandworm

    Long-form journalism on the GRU's hacking operations, the best non-technical book on what state-level cyber actually looks like.

    Beginner
    5/5Andy Greenberg
  7. 07 · 1989

    The Cuckoo's Egg

    Clifford Stoll's first-person account of investigating a 75-cent accounting discrepancy at LBNL that turned into a year-long pursuit of a KGB-paid intruder across early-internet networks.

    Beginner
    5/5Clifford Stoll
  8. 08 · 2020

    The Hacker and the State

    Ben Buchanan's argument that state-on-state cyber operations are not deterrence-shaped (like nuclear) but signaling-shaped: countries use cyber to shape the environment, not to threaten escalation. Builds the case from declassified incidents.

    Beginner
    5/5Ben Buchanan
Back to The Art of DeceptionWhat to read after The Art of Deception