This author participates in the Readers' Favorite Free Book Program, which is open to all readers and is completely free. The author will provide you with a free copy of their book in exchange for an honest review. You and the author will discuss what sites you will post your review to and what kind of copy of the book you would like to receive (eBook, PDF, Word, paperback, etc.). To begin, click the purple email icon to send this author a private email.
This author participates in the Readers' Favorite Book Review Exchange Program, which is open to all authors and is completely free. Simply put, you agree to provide an honest review an author's book in exchange for the author doing the same for you. What sites your reviews are posted on (B&N, Amazon, etc.) and whether you send digital (eBook, PDF, Word, etc.) or hard copies of your books to each other for review is up to you. To begin, click the purple email icon to send this author a private email, and be sure to describe your book or include a link to your Readers' Favorite review page or Amazon page.
This author participates in the Readers' Favorite Book Donation Program, which was created to help nonprofit and charitable organizations (schools, libraries, convalescent homes, soldier donation programs, etc.) by providing them with free books and to help authors garner more exposure for their work. This author is willing to donate free copies of their book in exchange for reviews (if circumstances allow) and the knowledge that their book is being read and enjoyed. To begin, click the purple email icon to send this author a private email. Be sure to tell the author who you are, what organization you are with, how many books you need, how they will be used, and the number of reviews, if any, you would be able to provide.
Reviewed by Vincent Dublado for Readers' Favorite
As hackers continue to level up their game, cybersecurity specialist, US Army veteran, and ex-NSA developer Ben McCarthy invites you into an ancient and effective way to fight cybercrime in Cyberjutsu: Cybersecurity for the Modern Ninja. The book’s message is clear and direct, and it all lies in the strategies and techniques that ninjas used for warfare. Using the lessons obtained from unearthed ninja scrolls from medieval times, this book allows you to visualize a more physical rather than a mere virtual or cyber environment, which then makes you think of hackers’ tactics and techniques as they relate to tangible assets. Every chapter provides you with Castle Theory exercises that ask you to solve a threat scenario using what you’ve learned about ninjas and cyber concepts.
Much like the lessons that The Art of War has provided for modern-day businesses and entrepreneurs, Cyberjutsu aims to give invaluable lessons from the past to help you not only think like a hacker but to think like a ninja as well. There is no doubt that what we need to protect our businesses and online privacy is an innovative practice and mindset that will put us always a step ahead against the enemy. Investment in security measures is only part of the answer, and we have seen that traditional methodologies can only do so much. As a modern voice referencing an ancient text, Ben McCarthy makes his book resonate on all levels. A highly recommended read for those who are concerned about facing the security challenges in this age of digital information.