Buy new:
$49.95
FREE delivery Saturday, July 13
Ships from: Amazon.com
Sold by: Amazon.com
$49.95
FREE Returns
FREE delivery Saturday, July 13. Order within 14 hrs 29 mins
Only 7 left in stock (more on the way).
$$49.95 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$49.95
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon.com
Ships from
Amazon.com
Sold by
Amazon.com
Sold by
Amazon.com
Returns
Eligible for Return, Refund or Replacement within 30 days of receipt
Eligible for Return, Refund or Replacement within 30 days of receipt
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Returns
Eligible for Return, Refund or Replacement within 30 days of receipt
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Payment
Secure transaction
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$24.44
Get Fast, Free Shipping with Amazon Prime FREE Returns
A solid used copy. Fast shipping + tracking ID with Amazon Prime and a 100% hassle-free guaranteed return policy. A solid used copy. Fast shipping + tracking ID with Amazon Prime and a 100% hassle-free guaranteed return policy. A solid used copy. Fast shipping + tracking ID with Amazon Prime and a 100% hassle-free guaranteed return policy. A solid used copy. Fast shipping + tracking ID with Amazon Prime and a 100% hassle-free guaranteed return policy. See less
FREE delivery Tuesday, July 16 on orders shipped by Amazon over $35
Only 1 left in stock - order soon.
$$49.95 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$49.95
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the authors

See all
Something went wrong. Please try your request again later.

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing 1st Edition

4.2 4.2 out of 5 stars 38 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$49.95","priceAmount":49.95,"currencySymbol":"$","integerValue":"49","decimalSeparator":".","fractionalValue":"95","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"IIYSyrrUaFdYmfWrZzDbTqC0r7XWCaQN01B6hisdPsmKK10AcO3prNZrV4lI8Gz8WCKZuqGZpXgo6F08zuSz4kgzHrBRaD8NDmXL%2FBNWotULlVQWSNShlupYwzCTUwemIOulb%2FoI5fI%3D","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$24.44","priceAmount":24.44,"currencySymbol":"$","integerValue":"24","decimalSeparator":".","fractionalValue":"44","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"IIYSyrrUaFdYmfWrZzDbTqC0r7XWCaQNSzbM0ftDgjA%2FqUZZSWtsoRqQ4sKUPBdW2dgBxUOYzamky%2F%2Bn%2BGanGtusrTInXzalVXCX2LUMnWmpsOUItmDJxxudczcox6MUPI22%2Fx3S26zShmvOo04%2Fgdi7Y6XmIHukEI%2BaspxxXfQZQEJk6QZ4fKr%2FOdJTcEhp","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.

As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the secrets to bypassing every conceivable high-tech security system. This book reveals those secrets; as the title suggests, it has nothing to do with high technology.

• Dumpster Diving
Be a good sport and don’t read the two “D” words written in big bold letters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny).
• Tailgating
Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows.
• Shoulder Surfing
If you like having a screen on your laptop so you can see what you’re working on, don’t read this chapter.
• Physical Security
Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity?
• Social Engineering with Jack Wiles
Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security.
• Google Hacking
A hacker doesn’t even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful.
• P2P Hacking
Let’s assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself.
• People Watching
Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we’ll take a look at a few examples of the types of things that draws a no-tech hacker’s eye.
• Kiosks
What happens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash?
• Vehicle Surveillance
Most people don’t realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!

Amazon First Reads | Editors' picks at exclusive prices

Frequently bought together

$49.95
Get it as soon as Saturday, Jul 13
Only 7 left in stock (more on the way).
Ships from and sold by Amazon.com.
+
$11.84
Get it as soon as Saturday, Jul 13
In Stock
Ships from and sold by Amazon.com.
+
$20.49
Get it as soon as Saturday, Jul 13
In Stock
Ships from and sold by Amazon.com.
Total price:
To see our price, add these items to your cart.
Details
Added to Cart
spCSRF_Control
Some of these items ship sooner than the others.
Choose items to buy together.

Editorial Reviews

Review

The combination of Kevin Mitnick & Johnny Long is a one-two punch

From the Back Cover

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.

As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the secrets to bypassing every conceivable high-tech security system. This book reveals those secrets; as the title suggests, it has nothing to do with high technology.

Product details

  • Publisher ‏ : ‎ Syngress; 1st edition (March 7, 2008)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 384 pages
  • ISBN-10 ‏ : ‎ 1597492159
  • ISBN-13 ‏ : ‎ 978-1597492157
  • Item Weight ‏ : ‎ 1.41 pounds
  • Dimensions ‏ : ‎ 7.52 x 0.75 x 9.13 inches
  • Customer Reviews:
    4.2 4.2 out of 5 stars 38 ratings

About the authors

Follow authors to get new release updates, plus improved recommendations.

Customer reviews

4.2 out of 5 stars
4.2 out of 5
38 global ratings

Customers say

Customers find the book's content interesting and useful, with much-needed alternative perspectives. They also appreciate the writing style, saying it's awesome.

AI-generated from the text of customer reviews

Select to learn more
5 customers mention "Content"5 positive0 negative

Customers find the book's content interesting and much-needed alternative perspectives. They also say the information remains relevant and useful 15 years later. Readers also mention the book is excellent and easy to read.

"I bought this book in 2008, and Its information remains relevant 15 years later. That's amazing for anything related to technology...." Read more

"This book is loaded with info that every sys/network admin needs to know. I just got through reading it and wish I would have read it sooner...." Read more

"...Overall, each chapters are interesting but in some chapters the authors seem more motivated to show off how smart they are and desire to share the..." Read more

"...Second it's got some great concepts and is a very good beginning place...." Read more

4 customers mention "Writing style"4 positive0 negative

Customers find the writing style awesome, straightforward, and accurate.

"...Johnny's parts of the book are straightforward enough and appear accurate as far as they go. The writing style is informal throughout...." Read more

"...Requires little tech knowledge, easy to read, and suited for anyone who likes their data to remain their own, or would like to make someone else's..." Read more

"First off the best part of this book is it is written in a funny and exciting way...." Read more

"...Need I say more... This is a great book for beginners and an easy read." Read more

Top reviews from the United States

Reviewed in the United States on April 8, 2008
Johnny Long's book, "No Tech Hacking," brings new attention to overlooked aspects of information security. In his book, Long reveals how simple threats can cause serious problems, even in organizations prepared for a Mission Impossible-style attack scenario.

Long recounts how he and his team of ethical hackers consistently access sensitive information with no special equipment or technical skills. In fact, Long reveals how the ordinary (coat hangers, hand towels, drinking straws, baby powder, and aluminum cans) can result in extraordinary breaches of organizational security.

Long shares real world stories and cell-phone photographs from his adventures in people watching, shoulder surfing, dumpster diving, and vehicle observation.

Long and his colleagues go to great, conspicuous lengths to collect non-public information. While their targets should notice almost all of their activities, most do not. The closest thing to a consequence or confrontation they encounter is a glare from an airline passenger.

Why isn't Long confronted when others observe him surreptitiously taking pictures? Some people don't like to confront an unfamiliar person or don't know whom to report their concerns to. Others are complacent and don't expect negative events to occur. Action invites risk: risk of an awkward or unwarranted accusation, that one won't be taken seriously, and possible personal embarrassment. Sometimes, people feel that the safest action is no action at all. Unfortunately, that feeling of security is deceptive.

Thankfully, Long offers useful advice. He recommends that companies should:

1. Provide incentives for reporting suspicious activities, and
2. Make the desired response well-known and easy-to-do.

To follow these recommendations, organizations need to ensure that everyone knows what information to disclose and what information requires protection. Foremost, all organizations should create policies for verifying the identity of anyone who requests non-public information and adequately train all employees to recognize these situations and take appropriate actions.

In the next edition, it would be great to see more of the practical tips (perhaps even a detailed checklist for each chapter) about what do to protect against these simple, but damaging, threats.

Summary: This is a useful book for creating and spreading awareness of important and often overlooked aspects of information security.
10 people found this helpful
Report
Reviewed in the United States on December 10, 2023
I bought this book in 2008, and Its information remains relevant 15 years later. That's amazing for anything related to technology.

Who would be interested in this book? The obvious answer is people who want to know how to break into organizations and take things. The less obvious answer is people who want to learn what's possible as a way to prevent it.

Wherever you fall on that spectrum, if you have any interest in physical security, this book should be on your shelf.
Reviewed in the United States on January 10, 2011
This book is loaded with info that every sys/network admin needs to know. I just got through reading it and wish I would have read it sooner. I found several of the described physical security vulnerabilities in and around my data center. I've been a sys admin for many years. Because of my technical focus, the non-technical threats that were present in my IT environment got over looked. I'm now working to mitigate these issues that put my high tech security system at risk. I've invested countless hours and my company has invested thousands of dollars in building a layered security system. All these efforts could potentially leave us defenseless to the non-tech attacks described in this book. This book was published a few years ago but the info here is still valid because of the human element present in the IT infrastructure. I can't wait to read some more of Johnny Long's books!
2 people found this helpful
Report
Reviewed in the United States on December 7, 2010
Johnny takes us on a cook's tour through the basics of social engineering and a few other non-technical methods of compromising a target organization.

In most aspects, the coverage is distinctly superficial, barely scratching the surface. In the cover blurb, the author claims to be disclosing super-cool secrets but in reality the book falls well short of disclosing anything really novel.

Other common social engineering methods, for example the psychological manipulation techniques often described by Kevin Mitnick, phishing and many other types of frauds and scams perpetrated through a variety of communications media (email, phone, letter, FAX, SMS, even paper notes left on a windshield ...), are barely mentioned. The author doesn't explain the process of non-technical hacking very well, in other words the stages normally involved in identifying, researching and exploiting a target. That a social engineer or intruder would fear detection and would almost certainly have pre-planned a cover story and escape route, for example, is only vaguely hinted at.

As seems to be the way with Syngress books, the print quality is poor. Most of the monochromatic photographic images are dark and indistinct, barely good enough even to make out the fields that have not been deliberately blurred by the author.

The social engineering chapter has a different style to the rest of the book, which is not surprising given that it was written by Jack Wiles (who for some reason is not acknowledged as an author on the cover). Jack's contribution is above average so it's a shame he didn't collaborate with Johnny on the rest. Johnny's parts of the book are straightforward enough and appear accurate as far as they go. The writing style is informal throughout.

With so many photos in the book and a large font, the average page has only about 100 words, hence I was able to read the book cover-to-cover in about 4 hours. This is no heavyweight academic textbook, with hardly any actual references or even acknowledgments outside the hacking subculture.

It's hard to figure out to whom the book might appeal. It is too superficial to be of much value to actual non-tech hackers unless they are very new to the game, and it lacks the pragmatism and sound advice on countermeasures that would be of some worth to information security and risk management professionals. Maybe it would interest members of the general public, but again it expounds on the risks without really helping anyone counteract them.

Although the author ably describes some simple non-technical attack methods, it is a shame he doesn't present a more compelling call-to-action. Readers can and indeed should be more aware of, and ideally resistant to, the methods described. The book presents the basic information but doesn't really motivate readers to respond, leaving it rather flat.
14 people found this helpful
Report

Top reviews from other countries

Andrew Mark Rowe
5.0 out of 5 stars An enjoyable read thanks
Reviewed in the United Kingdom on July 2, 2020
I am using this as part of my Computer studies, its easy to understand and comprehensive. Also usefull for anyone who handles data on a day to day basis.
Kassandra
5.0 out of 5 stars A well presented book
Reviewed in the United Kingdom on April 21, 2012
This is easy to read and full of ideas and I sight, even for people like me who are in that are of business. Very entertaining like his presentations on YouTube, which I also recommend
3 people found this helpful
Report
C. A. Bird
3.0 out of 5 stars Three Stars
Reviewed in the United Kingdom on April 17, 2015
Excellent