Introduction
Chapter 1, Mapping Networks
Chapter 2, Guarding with Special Care
Chapter 3, Xenophobic Security
Chapter 4, Identification Challenge
Chapter 5, Double-Sealed Password
Chapter 6, Hours of Infiltration
Chapter 7, Access to Time
Chapter 8, Tools
Chapter 9, Sensors
Chapter 10, Bridges and Ladders
Chapter 11, Locks
Chapter 12, Moon on the Water
Chapter 13, Worm Agent
Chapter 14, Ghost on the Moon
Chapter 15, The Art of the Fireflies
Chapter 16, Live Capture
Chapter 17, Fire Attack
Chapter 18, Covert Communication
Chapter 19, Call Signs
Chapter 20, Light, Noise, and Litter Discipline
Chapter 21, Circumstances of Infiltration
Chapter 22, Zero-Days
Chapter 23, Hiring Shinobi
Chapter 24, Guardhouse Behavior
Chapter 25, Zero-Trust Threat Management
Chapter 26, Shinobi Tradecraft