Summary:
The book delves into the psychology and mechanics behind cons and why people are susceptible to deception, drawing on a range of real-life stories and scientific research. It explores the profile of both the con artist and the victim, examining the stages of the con and the human tendencies that enable confidence schemes to thrive.
Key points:
1. Persuasion Art: The book explores how con artists use psychology to manipulate and exploit victims.
Books similar to "The Confidence Game":

30 Covert Emotional Manipulation Tactics
Adelyn Birch

HBR's 10 Must Reads on Communication
Harvard Business Review

Dark Psychology and Manipulation
William Cooper

How to Win Friends and Influence People in the Digital Age
Dale Carnegie|Associates

Hype
Gabrielle Bluestone

Phishing for Phools
George A. Akerlof|Robert J. Shiller

The Art of Persuasion
Bob Burg

Psychopath Free
Jackson MacKenzie

Get Anyone to Do Anything
David J. Lieberman

Social Engineering
Christopher Hadnagy