Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Cyberjutsu
Cybersecurity for the Modern Ninja
Taschenbuch von Ben McCarty
Sprache: Englisch

25,25 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

auf Lager, Lieferzeit 4-7 Werktage

Kategorien:
Beschreibung
Cyberjutsu is an approachable and enlightening guide to modern cyber security and espionage, based on secret techniques shared in ancient Japanese ninja scrolls. Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security.

Cyberjutsu brings the tactics, techniques, and procedures ninjas used in feudal Japan into today's cyber security battlefield, creating an essential handbook for cyber defenders. The book uses authentic Japanese scrolls to analyze how real ninjas thought about and practiced information assurance, security, infiltration, and espionage that often required covert, unauthorized access to heavily fortified organizations--many of the same concepts cyber security professionals deal with every day. You'll learn:

• how to map a network like an adversary
• how to place network sensors like a ninja
• how ninja used social engineering techniques to slip into castles
• how ninja installed backdoors and implants into castles
• anti-attribution tactics used by ninja to protect their employer and punish the enemy
• ninja command and control communication (C2) techniques
• and much more!
Cyberjutsu is an approachable and enlightening guide to modern cyber security and espionage, based on secret techniques shared in ancient Japanese ninja scrolls. Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security.

Cyberjutsu brings the tactics, techniques, and procedures ninjas used in feudal Japan into today's cyber security battlefield, creating an essential handbook for cyber defenders. The book uses authentic Japanese scrolls to analyze how real ninjas thought about and practiced information assurance, security, infiltration, and espionage that often required covert, unauthorized access to heavily fortified organizations--many of the same concepts cyber security professionals deal with every day. You'll learn:

• how to map a network like an adversary
• how to place network sensors like a ninja
• how ninja used social engineering techniques to slip into castles
• how ninja installed backdoors and implants into castles
• anti-attribution tactics used by ninja to protect their employer and punish the enemy
• ninja command and control communication (C2) techniques
• and much more!
Über den Autor
Ben McCarty
Inhaltsverzeichnis
Chapter 1: Mapping Networks
Chapter 2: Guarding with Special Care
Chapter 3: Xenophobic Security
Chapter 4: Identification Challenges
Chapter 5: Double-Sealed Password
Chapter 6: Hours of Infiltration
Chapter 7: Access to Time
Chapter 8: Tools
Chapter 9: Sensors
Chapter 10: Bridges and Ladders
Chapter 11: Locks
Chapter 12: Moon on the Water
Chapter 13: Worm Agent
Chapter 14: Ghost on the Moon
Chapter 15: The Art of the Fireflies
Chapter 16: Live Capture
Chapter 17: Fire Attack
Chapter 18: Covert Communication
Chapter 19: Call Signs
Chapter 20: Light, Noise, and Litter Discipline
Chapter 21: Circumstances of Infiltration
Chapter 22: Zero Days
Chapter 23: Hiring Shinobi
Chapter 24: Guardhouse Behavior
Chapter 25: Zero Suspicion Threat Management
Chapter 26: Shinobi Tradecraft
Details
Erscheinungsjahr: 2021
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: 264 S.
ISBN-13: 9781718500549
ISBN-10: 1718500548
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: McCarty, Ben
Hersteller: Random House LLC US
No Starch Press
Verantwortliche Person für die EU: Petersen Buchimport GmbH, Vertrieb, Weidestraße 122 a, D-22083 Hamburg, gpsr@petersen-buchimport.com
Maße: 226 x 151 x 23 mm
Von/Mit: Ben McCarty
Erscheinungsdatum: 26.04.2021
Gewicht: 0,41 kg
Artikel-ID: 118550065
Über den Autor
Ben McCarty
Inhaltsverzeichnis
Chapter 1: Mapping Networks
Chapter 2: Guarding with Special Care
Chapter 3: Xenophobic Security
Chapter 4: Identification Challenges
Chapter 5: Double-Sealed Password
Chapter 6: Hours of Infiltration
Chapter 7: Access to Time
Chapter 8: Tools
Chapter 9: Sensors
Chapter 10: Bridges and Ladders
Chapter 11: Locks
Chapter 12: Moon on the Water
Chapter 13: Worm Agent
Chapter 14: Ghost on the Moon
Chapter 15: The Art of the Fireflies
Chapter 16: Live Capture
Chapter 17: Fire Attack
Chapter 18: Covert Communication
Chapter 19: Call Signs
Chapter 20: Light, Noise, and Litter Discipline
Chapter 21: Circumstances of Infiltration
Chapter 22: Zero Days
Chapter 23: Hiring Shinobi
Chapter 24: Guardhouse Behavior
Chapter 25: Zero Suspicion Threat Management
Chapter 26: Shinobi Tradecraft
Details
Erscheinungsjahr: 2021
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: 264 S.
ISBN-13: 9781718500549
ISBN-10: 1718500548
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: McCarty, Ben
Hersteller: Random House LLC US
No Starch Press
Verantwortliche Person für die EU: Petersen Buchimport GmbH, Vertrieb, Weidestraße 122 a, D-22083 Hamburg, gpsr@petersen-buchimport.com
Maße: 226 x 151 x 23 mm
Von/Mit: Ben McCarty
Erscheinungsdatum: 26.04.2021
Gewicht: 0,41 kg
Artikel-ID: 118550065
Sicherheitshinweis