null
Loading... Please wait...
FREE SHIPPING on All Unbranded Items LEARN MORE
Print This Page

Cyberjutsu (Cybersecurity for the Modern Ninja)

List Price: $29.99
SKU:
9781718500549
Quantity:
Minimum Purchase
25 unit(s)
  • Availability: Confirm prior to ordering
  • Branding: minimum 50 pieces (add’l costs below)
  • Check Freight Rates (branded products only)

Branding Options (v), Availability & Lead Times

  • 1-Color Imprint: $2.00 ea.
  • Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
  • Belly-Band Wrap: $2.50 ea. (full-color printed)
  • Set-Up Charge: $45 per decoration
FULL DETAILS
  • Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
  • Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
  • Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
  • RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
  • Product Details

    Author:
    Ben McCarty
    Format:
    Paperback
    Pages:
    264
    Publisher:
    No Starch Press (April 26, 2021)
    Language:
    English
    ISBN-13:
    9781718500549
    ISBN-10:
    1718500548
    Weight:
    14oz
    Dimensions:
    6" x 9" x 0.75"
    Case Pack:
    26
    File:
    RandomHouse-PRH_Book_Company_PRH_PRT_Onix_full_active_D20260405T164101_155746753-20260405.xml
    Folder:
    RandomHouse
    List Price:
    $29.99
    As low as:
    $23.09
    Publisher Identifier:
    P-RH
    Discount Code:
    A
    QuickShip:
    Yes
    Audience:
    General/trade
    Country of Origin:
    United States
    Pub Discount:
    65
    Imprint:
    No Starch Press
  • Overview

    Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security.

    Cyberjutsu presents a practical cybersecurity field guide based on the techniques, tactics, and procedures (TTPs) of the ancient ninja. Author Ben McCarty, a cyber warfare specialist and former NSA developer, analyzes once-secret Japanese scrolls, drawing parallels to modern infosec concepts to provide unique insights on defensive and offensive security. He translates the training methodologies of Japan’s most notorious covert agents—history’s first advanced persistent threat (APT)—into highly effective practices for countering information warfare, espionage, supply-chain attacks, zero-day exploits, and more.
     
    Each chapter examines one TTP in detail—like assessing gaps in a target’s defense, striking where the enemy is negligent, and mastering the art of invisibility—and explains what the concept can teach us about the current cybersecurity landscape. McCarty recommends in-depth mitigations and security controls, mapped to the NIST 800-53 standard, and a “Castle Theory Thought Exercise” that helps you apply the ancient lesson to protect your castle (network) from enemy ninja (cyber threat actors). You’ll discover the effectiveness of ancient social engineering strategies and trap-based security controls; see why mapping your network like an adversary gives you the advantage; and apply lessons from old-world tools, like the “ninja ladder,” to prevent attacks.
     
    Topics also include:
        Threat modeling, threat intelligence, and targeted controls
        Countermeasures like network sensors, time-based controls, airgaps, and improved authentication protocols
        Profiles of insider threats, and ways to recognize them in employees
        Covert communication TTPs and their implications for malware command and control (C2)
        Methods for detecting attackers, preventing supply-chain attacks, and defending against zero-day exploits
     
    In this book, you’ll see the astonishing power of ninja information-gathering processes—and how adopting them just might be the key to innovating contemporary cybersecurity models.