logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Cyberjutsu: Cybersecurity for the Modern Ninja by Ben McCarty ISBN 9781718500549, 9781718500556, 1718500548, 1718500556

  • SKU: EBN-23885690
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.4

28 reviews
Instant download (eBook) Cyberjutsu: Cybersecurity for the Modern Ninja after payment.
Authors:Ben McCarty
Pages:264 pages.
Year:2021
Editon:1
Publisher:No Starch Press
Language:english
File Size:7.06 MB
Format:pdf
ISBNS:9781718500549, 9781718500556, 1718500548, 1718500556
Categories: Ebooks

Product desciption

(Ebook) Cyberjutsu: Cybersecurity for the Modern Ninja by Ben McCarty ISBN 9781718500549, 9781718500556, 1718500548, 1718500556

Cyberjutsu presents a practical cybersecurity field guide based on the techniques, tactics, and procedures (TTPs) of the ancient ninja. Author Ben McCarty, a cyber warfare specialist and former NSA developer, analyzes once-secret Japanese scrolls, drawing parallels to modern infosec concepts to provide unique insights on defensive and offensive security. He translates the training methodologies of Japan’s most notorious covert agents—history’s first advanced persistent threat (APT)—into highly effective practices for countering information warfare, espionage, supply-chain attacks, zero-day exploits, and more.
Each chapter examines one TTP in detail—like assessing gaps in a target’s defense, striking where the enemy is negligent, and mastering the art of invisibility—and explains what the concept can teach us about the current cybersecurity landscape. McCarty recommends in-depth mitigations and security controls, mapped to the NIST 800-53 standard, and a “Castle Theory Thought Exercise” that helps you apply the ancient lesson to protect your castle (network) from enemy ninja (cyber threat actors). You’ll discover the effectiveness of ancient social engineering strategies and trap-based security controls; see why mapping your network like an adversary gives you the advantage; and apply lessons from old-world tools, like the “ninja ladder,” to prevent attacks.
Topics also include:
• Threat modeling, threat intelligence, and targeted controls
• Countermeasures like network sensors, time-based controls, airgaps, and improved authentication protocols
• Profiles of insider threats, and ways to recognize them in employees
• Covert communication TTPs and their implications for malware command and control (C2)
• Methods for detecting attackers, preventing supply-chain attacks, and defending against zero-day exploits
In this book, you’ll see the astonishing power of ninja information-gathering processes—and how adopting them just might be the key to innovating contemporary cybersecurity models.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products