14,95 €
14,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
7 °P sammeln
14,95 €
14,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
7 °P sammeln
Als Download kaufen
14,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
7 °P sammeln
Jetzt verschenken
14,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
7 °P sammeln
  • Format: ePub

Cyberjutsu is an approachable and enlightening guide to modern cyber security and espionage, based on secret techniques shared in ancient Japanese ninja scrolls. Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security. Cyberjutsu brings the tactics, techniques, and procedures ninjas used in feudal Japan into today's cyber security battlefield, creating an essential handbook for cyber defenders. The book uses authentic Japanese scrolls to analyze how real ninjas thought about and…mehr

  • Geräte: eReader
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 3.07MB
  • FamilySharing(5)
Produktbeschreibung
Cyberjutsu is an approachable and enlightening guide to modern cyber security and espionage, based on secret techniques shared in ancient Japanese ninja scrolls. Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security. Cyberjutsu brings the tactics, techniques, and procedures ninjas used in feudal Japan into today's cyber security battlefield, creating an essential handbook for cyber defenders. The book uses authentic Japanese scrolls to analyze how real ninjas thought about and practiced information assurance, security, infiltration, and espionage that often required covert, unauthorized access to heavily fortified organizations--many of the same concepts cyber security professionals deal with every day. You'll learn: • how to map a network like an adversary • how to place network sensors like a ninja • how ninja used social engineering techniques to slip into castles • how ninja installed backdoors and implants into castles • anti-attribution tactics used by ninja to protect their employer and punish the enemy • ninja command and control communication (C2) techniques • and much more!

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Ben McCarty is a cybersecurity specialist and former developer for the NSA, where he created cyberspace tools used by the intelligence community and DoD. He served in the US Army's Network Warfare Battalion and became the first fully qualified cyber warfare specialist (35Q) in US Army history. He is currently a quantum security researcher in the Washington, DC, area.
Rezensionen
"As novel as it is illuminating, as it looks deep into the past. . . . [McCarty] provides a remarkably comprehensive tour of his subject, which is especially impressive for such a concise work that s well under 300 pages. In it, he covers such as topics as mapping networks and authentication, and provides unconventional tips, as well . . . A thoughtful, original, and thorough guide to cybersecurity."
Kirkus Reviews

"Cyberjutsu is an innovative work that is both highly technical and very readable. . . . it s packed with ideas, tips, and practical techniques for combating cyber threats. As such, the book is likely to prove an invaluable resource for individuals and organizations looking to improve their cybersecurity practices."
Erin Britton, San Francisco Book Review

"A very well researched and clearly organized book that uses Japanese history quite cleverly to illustrate modern cybersecurity problems, suggesting ways to counter technological invaders and hackers based on techniques used to defend castles against attacks by clever and resourceful ninja."
Catherine Langrehr, IndieReader, Starred Review

"Pairs modern information security methods with ancient Japanese traditions, elevating both subjects in order to elucidate elements of the former. . . . an easy resource whose reference material flows well."
Foreword Reviews

"A good quality book."
Antony Cummins, The Historical Ninjutsu Research Team

"This helpful manual explores the field of cybersecurity, providing tips, tricks, and proven methods to help companies keep online information out of the hands of hackers. . . . Combining philosophical exercises with more concrete plans of action, McCarty blends new and old, complex and simple, to craft this intricate guide."
BookLife

"The exercises are of a kind that would deeply kindle readers interest and spur them on to intense problem-solving activity as well as hands-on experimentation in a naturally appealing manner, particularly if you grew up loving adventure/mystery stories involving castles, kings, and queens. . . . [geeks will] find it highly enjoyable and challenging!"
Raju Chacko, Reedsy

"May appeal to CEOs in the same way they might turn to Sun Tzu s The Art of War to level up their plan of attack. The book is also a good overview of cybersecurity for students and anyone considering a career in this expanding field. . . . Cyberjutsu, with its knowledge of the past and its applications for the future, is sure to inspire both cybersecurity insiders and the curious."
Joanna Poncavage, BookTrib

"A labor of love . . . There is much value in the descriptions, analogies and schemes as described. The cyber technology presented is correct and complete. I am no expert in Ninja warfare, but the analogies absolutely makes sense."
A Book Junkie Reviews

"I had a lot of fun reading this book. It is by far one of the easiest technical books that I have read in a while. I m not sure whether that was due to the comparisons to Shinobi holding my interest. Or whether it was due to the authors writing style that made it easy to read. Either way I blitzed through this book quickly and have recommended it to a few of my colleagues in the Cybersecurity industry."
HaXeZ, Medium

"Don t let its whimsical title fool you; this book is a practical and prescient compendium of cybersecurity concepts that lends itself to anyone considering a career in this expanding field along with organizational leaders seeking to level up their plan of attack with ninja-fueled tactics, techniques and procedures."
Herald & Review
…mehr