I enjoyed a few of the tidbits of information provided in the overly long listen, e.g., you can't alway trust Caller ID, but I was disappointed by the author's tone of the book. I was expecting a more thoughtful analysis of the ways security can be enhanced and how hackers and information thieves work. What I received was a less than insightful book by a man who is obviously still proud of his criminal expoits, regardless of the harm he certainly caused.
The first three or four examples of computer hacking achieved by fooling people into divulging seemingly innocent information were interesting, but the rest of the book is more of the same. I couldn't force myself to listen to more than the first third.
I could only listen to the first couple of hours. This reminded me of a term paper where the student is overly verbose to extend the paper to the required length.