Text
Cyberjutsu: cybersecurity for the modern ninja
Table of Contents
Chapter 1: Mapping Networks
Chapter 2: Guarding with Special Care
Chapter 3: Xenophobic Security
Chapter 4: Identification Challenges
Chapter 5: Double-Sealed Password
Chapter 6: Hours of Infiltration
Chapter 7: Access to Time
Chapter 8: Tools
Chapter 9: S
No other version available