Cyberjutsu: Cybersecurity for the Modern Ninja. Ben McCarty
Cyberjutsu-Cybersecurity.pdf
ISBN: 9781718500549 | 264 pages | 7 Mb
- Cyberjutsu: Cybersecurity for the Modern Ninja
- Ben McCarty
- Page: 264
- Format: pdf, ePub, fb2, mobi
- ISBN: 9781718500549
- Publisher: No Starch Press
Books downloads ipod Cyberjutsu: Cybersecurity for the Modern Ninja PDF by Ben McCarty (English Edition) 9781718500549
Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security. Cyberjutsu presents a practical cybersecurity field guide based on the techniques, tactics, and procedures (TTPs) of the ancient ninja. Author Ben McCarty, a cyber warfare specialist and former NSA developer, analyzes once-secret Japanese scrolls, drawing parallels to modern infosec concepts to provide unique insights on defensive and offensive security. He translates the training methodologies of Japan’s most notorious covert agents—history’s first advanced persistent threat (APT)—into highly effective practices for countering information warfare, espionage, supply-chain attacks, zero-day exploits, and more. Each chapter examines one TTP in detail—like assessing gaps in a target’s defense, striking where the enemy is negligent, and mastering the art of invisibility—and explains what the concept can teach us about the current cybersecurity landscape. McCarty recommends in-depth mitigations and security controls, mapped to the NIST 800-53 standard, and a “Castle Theory Thought Exercise” that helps you apply the ancient lesson to protect your castle (network) from enemy ninja (cyber threat actors). You’ll discover the effectiveness of ancient social engineering strategies and trap-based security controls; see why mapping your network like an adversary gives you the advantage; and apply lessons from old-world tools, like the “ninja ladder,” to prevent attacks. Topics also include: • Threat modeling, threat intelligence, and targeted controls • Countermeasures like network sensors, time-based controls, airgaps, and improved authentication protocols • Profiles of insider threats, and ways to recognize them in employees • Covert communication TTPs and their implications for malware command and control (C2) • Methods for detecting attackers, preventing supply-chain attacks, and defending against zero-day exploits In this book, you’ll see the astonishing power of ninja information-gathering processes—and how adopting them just might be the key to innovating contemporary cybersecurity models.
Browse Books: Computers / Security / Cryptography | The Last
Cyberjutsu by Ben McCarty | Waterstones
Browse Books: Computers / Security | Dolly's Bookstore
Cyberjutsu: Cybersecurity for the Modern Ninja: McCarty, Ben
Cyberjutsu: Cybersecurity for the Modern Ninja | LaptrinhX
Cyberjutsu: Cybersecurity for the Modern Ninja - Ben McCarty
Cyberjutsu: Cybersecurity for the Modern Ninja - YES24
Cyberjutsu by McCarty, Ben (ebook) - eBooks.com
Coming Soon | No Starch Press
No Starch Press - the finest in geek - Amazon.com
CYBERJUTSU. Copyright © 2021 by Ben McCarty. All rights
Amazon.com New Releases: The best-selling new & future
Cyberjutsu on Apple Books - Apple Books. An all-new chapter.
Browse Books: Computers / Security / Networking | Chaucer's
Download more ebooks:
[Descargar pdf] LA VENTA
EBOOK
The Gone World by Tom Sweterlitsch on Audiobook New
[PDF] Rumple Buttercup: A Story of Bananas, Belonging, and Being Yourself Heirloom Edition by Matthew Gray Gubler
ANTROPOCEANO: CUIDAR LOS MARES PARA SALVAR LA VIDA leer el libro
The Mortal Instruments: The Graphic Novel, Vol. 3 by Cassandra Clare, Cassandra Jean on Ipad
0コメント