// Prerequisites
What to read before The Art of Deception
If The Art of Deception feels too steep at beginner level, here is what to read first. Lighter books in the same topics that build the prerequisites this one assumes.
01 · 2011
Ghost in the Wires
Kevin Mitnick's first-person account of his 1990s social-engineering and phone-system intrusions, foreword by Steve Wozniak. Self-promotional in tone but a primary source on a defining era.
Beginner4/5Kevin Mitnick, William L. Simon02 · 2019
Foundations of Information Security
Jason Andress' compact tour of the field: confidentiality / integrity / availability, identification and authentication, network and OS controls, written for newcomers and adjacent disciplines.
Beginner4/5Jason Andress03 · 2021
How Cybersecurity Really Works
Sam Grubb's gentle, exercise-driven introduction for non-specialists who need a working mental model of attacker behaviour and basic defence.
Beginner4/5Sam Grubb04 · 2018
Social Engineering
Christopher Hadnagy's broad procedural reference on social engineering as a discipline — recon, pretexting, elicitation, microexpressions, and the structured engagement model his consultancy operationalized.
Intermediate4/5Christopher Hadnagy05 · 2011
Kingpin
Kevin Poulsen's reconstruction of Max Butler's career — from white-hat consultant to running CardersMarket, the carding forum that consolidated the early-2000s underground — and the FBI investigation that finally took him down.
Beginner5/5Kevin Poulsen06 · 2019
Sandworm
Long-form journalism on the GRU's hacking operations, the best non-technical book on what state-level cyber actually looks like.
Beginner5/5Andy Greenberg07 · 1989
The Cuckoo's Egg
Clifford Stoll's first-person account of investigating a 75-cent accounting discrepancy at LBNL that turned into a year-long pursuit of a KGB-paid intruder across early-internet networks.
Beginner5/5Clifford Stoll08 · 2020
The Hacker and the State
Ben Buchanan's argument that state-on-state cyber operations are not deterrence-shaped (like nuclear) but signaling-shaped: countries use cyber to shape the environment, not to threaten escalation. Builds the case from declassified incidents.
Beginner5/5Ben Buchanan