{"id":14608,"date":"2025-01-22T17:23:18","date_gmt":"2025-01-22T23:23:18","guid":{"rendered":"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/"},"modified":"2025-10-15T12:19:50","modified_gmt":"2025-10-15T17:19:50","slug":"the-art-of-cyber-security","status":"publish","type":"book-dea","link":"https:\/\/stuff.io\/es\/book\/the-art-of-cyber-security\/","title":{"rendered":"The Art of Cyber Security"},"content":{"rendered":"<p>This book is about cybersecurity, but it\u2019s also about so much more; it\u2019s about giving you the skills to think creatively about your role in the cybersecurity industry.<\/p>\n\n\n\n<p>In Part 1, the author discusses his thoughts on the cybersecurity industry and how those that operate within it should approach their role with the mindset of an artist.<\/p>\n\n\n\n<p>Part 2 explores the work of Sun Tzu\u2019s\u00a0<em>El arte de la guerra<\/em>. The author analyses key sections and reviews them through the lens of cybersecurity and data protection to derive how his teachings can be used within the cybersecurity industry. Although Tzu\u2019s book on military strategy, tactics and operations was written more than 2,000 years ago,\u00a0<em>The Art of Cyber Security \u2013 A practical guide to winning the war on cyber crime<\/em>\u00a0reflects on how relevant Tzu\u2019s words are for today\u2019s technological era.<\/p>\n\n\n\n<p>This book celebrates the individuals who are striving to protect us in an ever-expanding technological era. Data and technology are so important to our lives, that protecting people who use technology is incredibly important. The professionals working to protect children, adults and corporations have a tough job, and this book celebrates their work while advocating ways for improving cybersecurity services and fighting cyber crime.<\/p>\n\n\n\n<p>This book will challenge your thinking and force you to approach cybersecurity and data protection from theoretical, philosophical, strategic, tactical and operational perspectives.<\/p>","protected":false},"featured_media":14611,"template":"","format":[59],"meta":{"_acf_changed":true},"book-author":[396],"blockchain":[4],"book-genre":[],"narrator":[],"book-publisher":[224],"series":[],"class_list":["post-14608","book-dea","type-book-dea","status-publish","has-post-thumbnail","hentry","book-author-gary-hibberd","blockchain-cardano","format-ebook","book-publisher-it-governance-publishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Art of Cyber Security - Stuff.io<\/title>\n<meta name=\"description\" content=\"Receive a different perspective on cybersecurity, and think differently about the industry and your place within it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/stuff.io\/es\/book\/the-art-of-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Art of Cyber Security - Book.io\" \/>\n<meta property=\"og:description\" content=\"Receive a different perspective on cybersecurity, and think differently about the industry and your place within it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/stuff.io\/es\/book\/the-art-of-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Stuff.io\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-15T17:19:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/Art-of-Cyber-Security-share-1024x538-1.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Art of Cyber Security - Book.io\" \/>\n<meta name=\"twitter:description\" content=\"Receive a different perspective on cybersecurity, and think differently about the industry and your place within it.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/Art-of-Cyber-Security-share-1024x538-2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/\",\"url\":\"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/\",\"name\":\"The Art of Cyber Security - Stuff.io\",\"isPartOf\":{\"@id\":\"https:\/\/stuff.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Art-of-Cyber-Security-2.png\",\"datePublished\":\"2025-01-22T23:23:18+00:00\",\"dateModified\":\"2025-10-15T17:19:50+00:00\",\"description\":\"Receive a different perspective on cybersecurity, and think differently about the industry and your place within it.\",\"breadcrumb\":{\"@id\":\"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/#primaryimage\",\"url\":\"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Art-of-Cyber-Security-2.png\",\"contentUrl\":\"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Art-of-Cyber-Security-2.png\",\"width\":512,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/stuff.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Art of Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/stuff.io\/#website\",\"url\":\"https:\/\/stuff.io\/\",\"name\":\"Stuff.io\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/stuff.io\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Art of Cyber Security - Stuff.io","description":"Receive a different perspective on cybersecurity, and think differently about the industry and your place within it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/stuff.io\/es\/book\/the-art-of-cyber-security\/","og_locale":"es_MX","og_type":"article","og_title":"The Art of Cyber Security - Book.io","og_description":"Receive a different perspective on cybersecurity, and think differently about the industry and your place within it.","og_url":"https:\/\/stuff.io\/es\/book\/the-art-of-cyber-security\/","og_site_name":"Stuff.io","article_modified_time":"2025-10-15T17:19:50+00:00","og_image":[{"url":"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/Art-of-Cyber-Security-share-1024x538-1.jpg"}],"twitter_card":"summary_large_image","twitter_title":"The Art of Cyber Security - Book.io","twitter_description":"Receive a different perspective on cybersecurity, and think differently about the industry and your place within it.","twitter_image":"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/Art-of-Cyber-Security-share-1024x538-2.jpg","twitter_misc":{"Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/","url":"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/","name":"The Art of Cyber Security - Stuff.io","isPartOf":{"@id":"https:\/\/stuff.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Art-of-Cyber-Security-2.png","datePublished":"2025-01-22T23:23:18+00:00","dateModified":"2025-10-15T17:19:50+00:00","description":"Receive a different perspective on cybersecurity, and think differently about the industry and your place within it.","breadcrumb":{"@id":"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/stuff.io\/book\/the-art-of-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/#primaryimage","url":"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Art-of-Cyber-Security-2.png","contentUrl":"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Art-of-Cyber-Security-2.png","width":512,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/stuff.io\/book\/the-art-of-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/stuff.io\/"},{"@type":"ListItem","position":2,"name":"The Art of Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/stuff.io\/#website","url":"https:\/\/stuff.io\/","name":"Stuff.io","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/stuff.io\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/book-dea\/14608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/book-dea"}],"about":[{"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/types\/book-dea"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/media\/14611"}],"wp:attachment":[{"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/media?parent=14608"}],"wp:term":[{"taxonomy":"book-author","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/book-author?post=14608"},{"taxonomy":"blockchain","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/blockchain?post=14608"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/format?post=14608"},{"taxonomy":"book-genre","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/book-genre?post=14608"},{"taxonomy":"narrator","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/narrator?post=14608"},{"taxonomy":"book-publisher","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/book-publisher?post=14608"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/series?post=14608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}