fashiontrendshw15 Öle & Betriebsstoffe für Ihr Auto mrp_family bestsellers-of-the-year-2015 Prime Photos November Fire TV Stick Movember Hier klicken Fire Shop Kindle WINTERFIT
The Art of Deception und über 1,5 Millionen weitere Bücher verfügbar für Amazon Kindle. Erfahren Sie mehr
  • Alle Preisangaben inkl. MwSt.
Nur noch 1 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
The Art of Deception: Con... ist in Ihrem Einkaufwagen hinzugefügt worden
+ EUR 3,00 Versandkosten
Gebraucht: Gut | Details
Zustand: Gebraucht: Gut
Kommentar: Ships from the USA; Allow 15-20 business days for delivery. May take as long as 25 days. Biggest little used bookstore in the world! Book has some visible wear on the binding, cover, pages.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Alle 3 Bilder anzeigen

The Art of Deception: Controlling the Human Element of Security (Computer Science) (Englisch) Gebundene Ausgabe – 8. Oktober 2002

4 Kundenrezensionen

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
Gebundene Ausgabe
"Bitte wiederholen"
EUR 45,27
EUR 25,55 EUR 2,85
21 neu ab EUR 25,55 15 gebraucht ab EUR 2,85 1 Sammlerstück ab EUR 58,90

Hinweise und Aktionen

  • Verschenken Sie Bücher zu Weihnachten: Entdecken Sie die schönsten Buchgeschenke zu Weihnachten, Adventskalender und Bücher rund ums Fest. Hier klicken.

Wird oft zusammen gekauft

  • The Art of Deception: Controlling the Human Element of Security (Computer Science)
  • +
  • The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Gesamtpreis: EUR 90,50
Die ausgewählten Artikel zusammen kaufen

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre E-Mail-Adresse oder Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Mehr über die Autoren

Entdecken Sie Bücher, lesen Sie über Autoren und mehr


The Art of Deception is about gaining someone's trust by lying to them and then abusing that trust for fun and profit. Hackers use the euphemism "social engineering" and hacker-guru Kevin Mitnick examines many example scenarios.

After Mitnick's first dozen examples anyone responsible for organizational security is going to lose the will to live. It's been said before, but people and security are antithetical. Organizations exist to provide a good or service and want helpful, friendly employees to promote the good or service. People are social animals who want to be liked. Controlling the human aspects of security means denying someone something. This circle can't be squared.

Considering Mitnick's reputation as a hacker guru, it's ironic that the last point of attack for hackers using social engineering are computers. Most of the scenarios in The Art of Deception work just as well against computer-free organizations and were probably known to the Phoenicians; technology simply makes it all easier. Phones are faster than letters, after all, and having large organizations means dealing with lots of strangers.

Much of Mitnick's security advice sounds practical until you think about implementation, when you realize that more effective security means reducing organizational efficiency--an impossible trade in competitive business. And anyway, who wants to work in an organization where the rule is "Trust no one"? Mitnick shows how easily security is breached by trust, but without trust people can't live and work together. In the real world, effective organizations have to acknowledge that total security is a chimera--and carry more insurance. --Steve Patient,


Mitnick is the most famous computer hacker in the world. Since his first arrest in 1981, at age 17, he has spent nearly half his adult life either in prison or as a fugitive. He has been the subject of three books and his alleged 1982 hack into NORAD inspired the movie WarGames. Since his plea-bargain release in 2000, he says he has reformed and is devoting his talents to helping computer security. It's not clear whether this book is a means toward that end or a, wink-wink, fictionalized account of his exploits, with his name changed to protect his parole terms. Either way, it's a tour de force, a series of tales of how some old-fashioned blarney and high-tech skills can pry any information from anyone. As entertainment, it's like reading the climaxes of a dozen complex thrillers, one after the other. As a security education, it's a great series of cautionary tales; however, the advice to employees not to give anyone their passwords is bland compared to the depth and energy of Mitnick's description of how he actually hacked into systems. As a manual for a would-be hacker, it's dated and nonspecific -- better stuff is available on the Internet--but it teaches the timeless spirit of the hack. Between the lines, a portrait emerges of the old-fashioned hacker stereotype: a socially challenged, obsessive loser addicted to an intoxication sense of power that comes from stalking and spying. (Oct.)
Forecast: Mitnick's notoriety and his well written, entertaining stories should generate positive word-of-mouth. With the double appeal of a true-crime memoir and a manual for computer security, this book will enjoy good sales. (Publishers Weekly, June 24, 2002)
" interesting read..." (, 17 July 2002)
"...highly entertaining...will appeal to a broad audience..." (Publishing News, 26 July 2002)
The world's most famous computer hacker and cybercult hero, once the subject of a massive FBI manhunt for computer fraud, has written a blueprint for system security based on his own experiences. Mitnick, who was released from federal prison in 1998 after serving a 22-month term, explains that unauthorized intrusion into computer networks is not limited to exploiting security holes in hardware and software. He focuses instead on a common hacker technique known as social engineering in which a cybercriminal deceives an individual into providing key information rather than trying to use technology to reveal it. Mitnick illustrates the tactics comprising this "art of deception" through actual case studies, showing that even state-of-the-art security software can't protect businesses from the dangers of human error. With Mitnick's recommended security policies, readers gain the information their organizations need to detect and ward off the threat of social engineering. Required reading for IT professionals, this book is highly recommended for public, academic, and corporate libraries. [This should not be confused with Ridley Pearson's new thriller, The Art of Deception. --Ed]--Joe Accardi, William Rainey Harper Coll. Lib., Palatine, IL (Library Journal, August 2002)
He was the FBI's most-wanted hacker. But in his own eyes, Mitnick was simply a small-time con artist with an incredible memory, a knack for social engineering, and an enemy at The New York Times. That foe, John Markoff, made big bucks selling two books about Mitnick - without ever interviewing him. This is Mitnick's account, complete with advice for how to protect yourself from similar attacks. I believe his story. (WIRED Magazine, October 2002)
"Mitnick outlines dozens of social engineering scenarios in his book, dissecting the ways attackers can easily exploit what he describes as 'that natural human desire to help others and be a good team player.'" (, October 3, 2002)
"...Mitnick remains what can best be called a colourful character... The Art of Deception is an entertaining read - and more than a little scary..."
Financial Times vom 16.12.2002

" interesting read..." (, 17 July 2002)
"...highly entertaining...will appeal to a broad audience..." (Publishing News, 26 July 2002)
"required reading for IT professionals, [and] is highly recommended for public, academic, and corporate libraries." (Library Journal, August 2002)
"This is Mitnick's account, complete with advice for how to protect yourself from similar attacks. I believe his story." (Wired, October 2002)
"does deliver on 'social engineering' exercises." And "[o]ne way or another, you'll find the information useful." (Red Herring, October 2002)
"Mitnick outlines dozens of social engineering scenarios in his book, dissecting the ways attackers can easily exploit what he describes as 'that natural human desire to help others and be a good team player.'" (, October 3, 2002)
"Most of the book, coauthored by William Simon ..., is a series of fictional episodes depicting the many breathtakingly clever ways that hackers can dupe trusting souls into breaching corporate and personal security - information as simple as an unlisted phone number or as complicated as plans for a top-secret product under development." (Forbes, October 14, 2002)
"...the book describes how people can get sensitive information without even stepping near a computer through 'social engineering' -- the use of manipulation or persuasion to deceive people by convincing them that you are someone else." ('s Technology section, October 9, 2002)
"...engaging style...fascinating true stories..." (The CBL Source, October/December 2002)
"...the book describes how people can get information without even stepping near a computer..." (CNN, 16 October 2002)
"...each vignette reads like a mini-cybermystery thriller...I willingly recommend The Art of Deception. It could save you from embarrassment or an even worse fate..." (, 15 October 2002)
"...details the ways that employees can inadvertently leak information that can be exploited by hackers to compromise computer systems...the book is scary in ways that computer security texts usually do not manage to be..." (BBC online, 14 October 2002)
"...more educational than tell-all..." (Forbes, 2 October 2002)
"...would put a shiver into anyone responsible for looking after valuable computer data...the exploits are fictional but realistic...the book is about hacking peoples heads..." (The Independent, 21 October 2002)
"...the key strength of The Art of Deception is the stream of anecdotes - with explanations about how and why hacks succeed...provides a solid basis for staff training on security..." (Information Age, October 2002)
"...should be on the list of required reading. Mitnick has done an effective job of showing exactly what the greatest threat of attack is - people and their human nature..." (Unix Review, 18 October 2002)

Alle Produktbeschreibungen

In diesem Buch

(Mehr dazu)
a company may have purchased the best security technologies that money can buy, trained their people so well that they lock up all their secrets before going home at night, and hired building guards from the best security firm in the business. Lesen Sie die erste Seite
Mehr entdecken
Ausgewählte Seiten ansehen
Buchdeckel | Copyright | Inhaltsverzeichnis | Auszug | Stichwortverzeichnis | Rückseite
Hier reinlesen und suchen:


3.5 von 5 Sternen
Sagen Sie Ihre Meinung zu diesem Artikel

Die hilfreichsten Kundenrezensionen

13 von 14 Kunden fanden die folgende Rezension hilfreich Von Frank Nimphius am 17. Februar 2004
Format: Gebundene Ausgabe
In seinem Buch "The Art of Deception" beschreibt Kevin D. Mitnick die Seite der Anwendungssicherheit, die nicht über Software geregelt (oder gestört) wird, sondern über das nicht zu kontrollierende Element Mensch.
Kevin verdeutlicht, daß mangelnde Sorgfalt, fehlende Unternehemens Policies im Umgang mit Kommunikation und Angst vor Fehlern seitens der Angestellten einem Unbefugten Zugriff auf Informationen ermöglichen, die er besser garnicht haben sollte.
Insgesamt ist das Buch sehr locker und informativ geschrieben und verfügt über genügend detailierte Beispiele um das, was Kevin vermitteln möchte, glaubhaft rüber zu bringen (Auch wenn man allgemein glauben möchte, dass der Amerikaner an sich eher etwas leichtgläubiger ist als ein Europäer, die geschilderten Fälle passieren in dieser Form überall auf der Welt).
Leider versteht Kevin es manchmal auch mit Beispielen etwas zu übetreiben und man fühlt, daß der Autor etwas auf der Stelle tritt. Als ungeduldiger Leser - der ich nunmal bin - neige ich hier und dort schon mal dazu "Es reicht, ich habe es verstanden" zu rufen.
Insgesamt ein gutes und informatives Buch, das gut zu lesen ist und Zugreisen, sowie Flüge, zu verkürzen versteht.
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden
1 von 1 Kunden fanden die folgende Rezension hilfreich Von Claus Näveke am 2. Januar 2015
Format: Taschenbuch
Kevin Mitnick beschreibt in diesem Buch, statt der üblichen technischen Angriffsvektoren, das Sicherheitsrisiko Mensch für IT-Systeme. Wer etwas über Social Engineering lernen möchte, der wird hier die ein oder andere interessante Geschichte lesen und Telefonanrufen in Zukunft etwas kritischer gegenüber stehen. Die Erzählungen sind dabei recht untechnisch und auch für Nicht-ITler gut geeignet.
Leider wiederholen sich die Inhalte nach einer Weile, was das lesen teilweise unnötig mühsam macht.
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden
4 von 6 Kunden fanden die folgende Rezension hilfreich Von Mark O'Neill am 20. Juni 2009
Format: Taschenbuch
I hugely enjoyed Mitnick's last book, The Art Of Intrusion, but this book by comparison is completely BORING. Mitnick just tells stories of people who conned companies and people over the phone and after a while, the stories get very boring and repetitive. Yeah, we get it Kevin - don't assume anything over the phone, and don't give out sensitive material to people you don't know. You don't need to bore us to death with 350 pages just to get those two central points across.

Avoid this book - unless you're looking for a strong sedative to put you to sleep at night.
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden
0 von 7 Kunden fanden die folgende Rezension hilfreich Von Carsten Winckler am 17. Juni 2014
Format: Gebundene Ausgabe
wie man eine komplett erfundene Story zum Bestseller machen kann, dann ist das ein gutes, ein sehr gutes Beispiel.

Sieht mir eher aus wie eine CIA-Hollywood-Operation um uns zu erklären, wie Hacker funktionieren.

Totale Scheiße!
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden

Die hilfreichsten Kundenrezensionen auf (beta) 197 Rezensionen
77 von 80 Kunden fanden die folgende Rezension hilfreich
Interesting cons, but repetitive and ego-trippy 24. März 2006
Von Luke Meyers - Veröffentlicht auf
Format: Gebundene Ausgabe
Mitnick has his own reputation to live up to with this book, which sets a pretty high bar for the audience who knows him as the "World's Most Notorious Hacker." Unfortunately, while he knows the material cold, his skills as an author are less stellar.

The vignettes describing various cons are, in the large, very entertaining. They're fictionalized, and sometimes the dialogue feels artificial. This book is supposed to convince us how easily people are victimized by social engineers. When the victim's dialogue plays too obviously into the con man's hands (for the purpose of illustrating the point relevant to the enclosing chapter/section), this goal is to some extent defeated. It's too easy to read unnatural dialogue and use that as an excuse to tell oneself, "I don't have to worry about that sort of attack -- I'm not that dumb!" More effort could have been expended in fictionalizing these scenarios without making them so difficult to relate to. Seeing how a con is performed is kind of like learning how a magic trick works -- it holds a similar fascination. Imagine seeing an amazing magic trick performed on television, wondering how it was possibly accomplished, and then learning that the trick was all in the video editing. That really sucks the fun out of the magic -- analogously, when the "trick" in one of these cons is just that the victim does something obviously stupid at just the right moment, the believability and enjoyment are damaged.

Despite what I've said, the cons are definitely enjoyable to read and do offer some genuine insights. Not all suffer from believability problems. However, the supporting material discussing these scenarios is pretty weak. There's a rigid format ("Analyzing the con," "Preventing the con," etc.) which leads the author to repeat the same points over and over again with very little variation, at times seemingly just to fit the format. The purpose of all this material is to give useful security recommendations and proper motivation for following them. The recommendations are on-target, but repeated ad nauseum.

The descriptions of social engineers also suffer from a tendency to stroke the author's own ego -- the bigger the con, the thicker the language about how smart, handsome, and clever the con man is. I'd like to be convinced by facts, not hyperbole.

I think this would really have worked better as two books, for two different audiences. One for entertainment, to read about all the cons and how they work, to get a little history of social engineering. And one for serious security discussion. The blend of the two leads to a schizoid work that's simply mediocre.
64 von 70 Kunden fanden die folgende Rezension hilfreich
Interesting & timely about the dangers of social engineering 15. Oktober 2002
Von Ben Rothke - Veröffentlicht auf
Format: Gebundene Ausgabe
Kevin Mitnick says "the term 'social engineering' is widely used within the computer security community to describe the techniques hackers use to deceive a trusted computer user within a company into revealing sensitive information, or trick an unsuspecting mark into performing actions that create a security hole for them to slip through." It's suitable that Mitnick, once vilified for his cracking exploits, has written a book about the human element of social engineering - that most subtle of information security threats.
Some readers may find a book on computer security penned by a convicted computer criminal blasphemous. Rather than focusing on the writer's past, it is clear that Mitnick wishes the book to be viewed as an attempt at redemption.
The Art of Deception: Controlling the Human Element of Security states that even if an organization has the best information systems security policies and procedures; most tightly controlled firewall, encrypted traffic, DMZ's, hardened operating systems patched servers and more; all of these security controls can be obviated via social engineering.
Social engineering is a method of gaining someone's trust by lying to them and then abusing that trust for malicious purposes - primarily gaining access to systems. Every user in an organization, be it a receptionist or a systems administrator, needs to know that when someone requesting information has some knowledge about company procedures or uses the corporate vernacular, that alone should not be authorization to provide controlled information.
The Art of Deception: Controlling the Human Element of Security spends most of its time discussing many different social engineering scenarios. At the end of each chapter, the book analyzes what went wrong and how the attack could have been prevented.
The book is quite absorbing and makes for fascinating reading. With chapter titles such as The Direct Attack; Just Asking for it; the Reverse Sting; and Using Sympathy, Guilt and Intimidation, readers will find the narratives interesting, and often they relate to daily life at work.
Fourteen of the 16 chapters give examples of social engineering covering many different corporate sectors, including financial, manufacturing, medical, and legal. Mitnick notes that while companies are busy rolling out firewalls and other security paraphernalia, there are often unaware of the threats of social engineering. The menace of social engineering is that it does not take any deep technical skills - no protocol decoders, no kernel recompiling, no port scans - just some smooth talk and a little confidence.
Most of the stories in the book detail elementary social engineering escapades, but chapter 14 details one particularly nasty story where a social engineer showed up on-site at a robotics company. With some glib talk, combined with some drinks at a fancy restaurant, he ultimately was able to get all of the design specifications for a leading-edge product.
In order for an organization to develop a successful training program against the threats of social engineering, they must understand why people are vulnerable to attack in the first place. Chapter 15 explains of how attackers take advantage of human nature. Only by identifying and understanding these tendencies (namely, Authority, Liking, Reciprocation, Consistency, Social Validation, and Scarcity), can companies ensure employees understand why social engineers can manipulate us all.
After more than 200 pages of horror stories, Part 4 (Chapters 15 and 16) details the need for information security awareness and training. But even with 100 pages of security policies and procedures (much of it based on ideas from Charles Cresson Wood's seminal book Information Security Policies Made Easy) the truth is that nothing in Mitnick's security advice is revolutionary - it's information security 101. Namely, educate end-users to the risks and threats of non-technical attacks.
While there are many books on nearly every aspect of information security, The Art of Deception is one of the first (Bruce Schneier's Secrets and Lies being another) to deal with the human aspect of security; a topic that has long been neglected. For too long, corporate America has been fixated with cryptographic key lengths, and not focused enough on the human element of security.
From a management perspective, The Art of Deception: Controlling the Human Element of Security should be on the list of required reading. Mitnick has done an effective job of showing exactly what the greatest threat of attack is - people and their human nature.
18 von 19 Kunden fanden die folgende Rezension hilfreich
Great book that shows what is possible! 31. Oktober 2002
Von Dr Anton Chuvakin - Veröffentlicht auf
Format: Gebundene Ausgabe
I waited for the book of the famous hacker Kevin Mitnick for a long
time, checking my mailbox every day after my pre-order was
completed. The book was almost worth the wait!
Its a fun book with lots of entertaining and education stories on what
is possible by means of social engineering attacks. The characters
clearly push the limits of this "human technology".
One of the articles I have read on the book called it "Kevin Mitnick's
Latest Deception" due to his downplaying of technology security
controls and emphasizing people skills and weaknesses. However, the
human weaknesses do nullify the strengths of technology defenses and
humans are much harder to "harden" than UNIX machines.
The attack side is stronger in the book than the defense side,
naturally following from the author's background. However, there are
some great defense resource on policy design, awareness and needed
vigilance. However, there is this "minor" issues with defense against
social engineering: one of the definitions called it a "hacker's
clever manipulation of the natural human tendency to trust". The word
"natural" is key; if we are to believe the definition, all defenses
against social engineering will be going against _nature_ and, as a
result, will be ineffective for most environments. Author also
advocates social engineering penetration testing, which appears to be
the best way to prepare for such attacks. Security awareness, while
needed, will get you so far.
The book's stories show examples of hackers defeating firewalls,
passwords, token and two-factor authentication systems, multi-layer
defense, financial institutions security, armed guards and many other
commonly believed to be effective security controls. While some of the
stories first seem to defy common sense, upon more detailed
investigation there are clearly believable. Dialogs, stories,
situations are described with terrifying reality behind them: "So what is the money transfer code for today? - Its this-and-that..." Social
engineers bravely attack and conquer on the pages of this great book!
The book will give lots of ideas to those involved in penetration
testing. Using the book, it is possible to extract a structure of a
successful attack, gather some target selection criteria, learn how to
combine social and technical attacks and then use it for the
The biggest shortcoming of the book is that it has no "attack HOWTO"
part. It has zero content on developing, improving and polishing the
social engineering skills. While it might seem that natural ability is
all it takes, the author _knows_ that there are methods to develop
social engineering skills, but chose not to disclose them and I regret
his decision to withhold such information.
Anton Chuvakin, Ph.D., GCIA is a Senior Security Analyst with a major
information security company. In his spare time he maintains his
security portal
28 von 32 Kunden fanden die folgende Rezension hilfreich
Amazing! This book will make you think 9. Oktober 2002
Von Ein Kunde - Veröffentlicht auf
Format: Gebundene Ausgabe
I went into this book thinking I knew a fair amount about security in general. You know, don't leave your network password on a post-it on your bulletin board, be aware of strangers in your office, that kind of thing. Then, I finished reading the book, and realized that it challenged all the assumptions that I had about the way I react in these situations. Mitnick's right - we as human beings are conditioned to be polite and trusting, and as horrible as it seems, that's not always right. But you don't have to become nasty and distrustful, just aware. That's what this book is talking about. The examples are wonderful - they really do read like a mystery thriller. And the advice is really sound. It doesn't mention it here, but there is a great flowchart in the back of the book that I've copied for everyone in my office. It details what to do if someone calls you for information that you are not sure they need or should be getting. All in all, The Art of Deception is a must read for many of us.
16 von 17 Kunden fanden die folgende Rezension hilfreich
Scary Stuff 27. Oktober 2002
Von Ein Kunde - Veröffentlicht auf
Format: Gebundene Ausgabe
When I picked this book up, I thought it was going to be an apologia from Mitnick for his prior life's work: cracking into supposedly secure phone and computer systems and networks. I read the book just before Hallowe'en, and that was appropriate, because the stories Mitnick recounts are really scary. Instead of wasting words explaining his own actions, Mitnick gives scores of fascinating examples of how most "security" proved to be simply non-existent. In the end, all security systems depend on humans, and therein lies the weakest link. The books shows how easy it is to gain people's trust- over the phone- and by getting them to reveal little bits of seemingly harmless information, gaining complete control over any data the con man (or woman) wants to get.
The book sets out security policies, and there's also a whole chapter on security training. One of Mitnick's recommendations is for companies to supply each employee with a copy of the book. Normally I'd dismiss this as blatant self-promotion. But believe me, in this case, the more people share the book's stories with each other at the water cooler, the closer the company will come to being a secure environment.
Mitnick makes it clear that everyone in the company has to be aware of security issues, and of the many types of attacks he describes so well, and know how to react to any demand for information, even from someone who appears to be an insider. By the time you finished the book, you'll be a believer, and you'll think two or three times before giving out information. And company security officers may want to stop simply sending e-mails about security, and get all employees (including the receptionists!) into classroom training.
The only problem I had with this book was Mitnick's use of the term "social engineering" to describe the manipulation of employees and security systems. Social engineering is what the conservatives accuse the liberals on the U.S. Supreme Court of doing.
But that's a minor item in an otherwise overwhelming and totally convincing book.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.