Notes

Introduction

Chapter 1, Mapping Networks

Chapter 2, Guarding with Special Care

Chapter 3, Xenophobic Security

Chapter 4, Identification Challenge

Chapter 5, Double-Sealed Password

Chapter 6, Hours of Infiltration

Chapter 7, Access to Time

Chapter 8, Tools

Chapter 9, Sensors

Chapter 10, Bridges and Ladders

Chapter 11, Locks

Chapter 12, Moon on the Water

Chapter 13, Worm Agent

Chapter 14, Ghost on the Moon

Chapter 15, The Art of the Fireflies

Chapter 16, Live Capture

Chapter 17, Fire Attack

Chapter 18, Covert Communication

Chapter 19, Call Signs

Chapter 20, Light, Noise, and Litter Discipline

Chapter 21, Circumstances of Infiltration

Chapter 22, Zero-Days

Chapter 23, Hiring Shinobi

Chapter 24, Guardhouse Behavior

Chapter 25, Zero-Trust Threat Management

Chapter 26, Shinobi Tradecraft