Cyberjutsu: Cybersecurity for the Modern Ninja
Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security.

Cyberjutsu is a practical cybersecurity field guide based on the techniques, tactics, and procedures of the ancient ninja. Cyber warfare specialist Ben McCarty’s analysis of declassified Japanese scrolls will show how you can apply ninja methods to combat today’s security challenges like information warfare, deceptive infiltration, espionage, and zero-day attacks.

Learn how to use key ninja techniques to find gaps in a target’s defense, strike where the enemy is negligent, master the art of invisibility, and more. McCarty outlines specific, in-depth security mitigations such as fending off social engineering attacks by being present with “the correct mind,” mapping your network like an adversary to prevent breaches, and leveraging ninja-like traps to protect your systems.

You’ll also learn how to:
  • Use threat modeling to reveal network vulnerabilities
  • Identify insider threats in your organization
  • Deploy countermeasures like network sensors, time-based controls, air gaps, and authentication protocols
  • Guard against malware command and-control servers
  • Detect attackers, prevent supply-chain attacks, and counter zero-day exploits

  • Cyberjutsu is the playbook that every modern cybersecurity professional needs to channel their inner ninja. Turn to the old ways to combat the latest cyber threats and stay one step ahead of your adversaries.
    "1136524849"
    Cyberjutsu: Cybersecurity for the Modern Ninja
    Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security.

    Cyberjutsu is a practical cybersecurity field guide based on the techniques, tactics, and procedures of the ancient ninja. Cyber warfare specialist Ben McCarty’s analysis of declassified Japanese scrolls will show how you can apply ninja methods to combat today’s security challenges like information warfare, deceptive infiltration, espionage, and zero-day attacks.

    Learn how to use key ninja techniques to find gaps in a target’s defense, strike where the enemy is negligent, master the art of invisibility, and more. McCarty outlines specific, in-depth security mitigations such as fending off social engineering attacks by being present with “the correct mind,” mapping your network like an adversary to prevent breaches, and leveraging ninja-like traps to protect your systems.

    You’ll also learn how to:
  • Use threat modeling to reveal network vulnerabilities
  • Identify insider threats in your organization
  • Deploy countermeasures like network sensors, time-based controls, air gaps, and authentication protocols
  • Guard against malware command and-control servers
  • Detect attackers, prevent supply-chain attacks, and counter zero-day exploits

  • Cyberjutsu is the playbook that every modern cybersecurity professional needs to channel their inner ninja. Turn to the old ways to combat the latest cyber threats and stay one step ahead of your adversaries.
    29.99 In Stock
    Cyberjutsu: Cybersecurity for the Modern Ninja

    Cyberjutsu: Cybersecurity for the Modern Ninja

    by Ben McCarty
    Cyberjutsu: Cybersecurity for the Modern Ninja

    Cyberjutsu: Cybersecurity for the Modern Ninja

    by Ben McCarty

    Paperback

    $29.99 
    • SHIP THIS ITEM
      Qualifies for Free Shipping
    • PICK UP IN STORE
      Check Availability at Nearby Stores

    Related collections and offers


    Overview

    Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security.

    Cyberjutsu is a practical cybersecurity field guide based on the techniques, tactics, and procedures of the ancient ninja. Cyber warfare specialist Ben McCarty’s analysis of declassified Japanese scrolls will show how you can apply ninja methods to combat today’s security challenges like information warfare, deceptive infiltration, espionage, and zero-day attacks.

    Learn how to use key ninja techniques to find gaps in a target’s defense, strike where the enemy is negligent, master the art of invisibility, and more. McCarty outlines specific, in-depth security mitigations such as fending off social engineering attacks by being present with “the correct mind,” mapping your network like an adversary to prevent breaches, and leveraging ninja-like traps to protect your systems.

    You’ll also learn how to:
  • Use threat modeling to reveal network vulnerabilities
  • Identify insider threats in your organization
  • Deploy countermeasures like network sensors, time-based controls, air gaps, and authentication protocols
  • Guard against malware command and-control servers
  • Detect attackers, prevent supply-chain attacks, and counter zero-day exploits

  • Cyberjutsu is the playbook that every modern cybersecurity professional needs to channel their inner ninja. Turn to the old ways to combat the latest cyber threats and stay one step ahead of your adversaries.

    Product Details

    ISBN-13: 9781718500549
    Publisher: No Starch Press
    Publication date: 04/26/2021
    Pages: 264
    Sales rank: 626,440
    Product dimensions: 5.90(w) x 8.90(h) x 1.00(d)

    About the Author

    Ben McCarty is a cybersecurity specialist and former developer for the NSA, where he created cyberspace tools used by the intelligence community and DoD. He served in the US Army’s Network Warfare Battalion and became the first fully qualified cyber warfare specialist (35Q) in US Army history. He is currently a quantum security researcher in the Washington, DC, area.

    Table of Contents

    Chapter 1: Mapping Networks
    Chapter 2: Guarding with Special Care
    Chapter 3: Xenophobic Security
    Chapter 4: Identification Challenges
    Chapter 5: Double-Sealed Password
    Chapter 6: Hours of Infiltration
    Chapter 7: Access to Time
    Chapter 8: Tools
    Chapter 9: Sensors
    Chapter 10: Bridges and Ladders
    Chapter 11: Locks
    Chapter 12: Moon on the Water
    Chapter 13: Worm Agent
    Chapter 14: Ghost on the Moon
    Chapter 15: The Art of the Fireflies
    Chapter 16: Live Capture
    Chapter 17: Fire Attack
    Chapter 18: Covert Communication
    Chapter 19: Call Signs
    Chapter 20: Light, Noise, and Litter Discipline
    Chapter 21: Circumstances of Infiltration
    Chapter 22: Zero Days
    Chapter 23: Hiring Shinobi
    Chapter 24: Guardhouse Behavior
    Chapter 25: Zero Suspicion Threat Management
    Chapter 26: Shinobi Tradecraft
    From the B&N Reads Blog

    Customer Reviews