0 Mėgstami
0Krepšelis

How to Achieve Network Security: Using Risk Assessment and Game Theory to Protect Your Systems

Šiuo metu neparduodama

Knygos aprašymas

Now, more than ever, Leaders such as yourself must incorporate heightened awareness of cybersecurity into your daily life. Many things can be automated, and there are people hired to keep breaches to a minimum in your offices. This handbook is intended to alert you to a surprising amount of control you can assert in the seemingly unending cyber-barrage on your networks, your company and personal devices, as well as your clients' personally identifiable information.The author, Wolf Halton has been in Information Technology roles since before there was a named IT Industry. He holds a Master’s Degree in IT Project Management and Leadership with a focus on Information Security. He has consulted with colleges to create graduate degrees (Master’s and PhD) in IT Security. He has been lead author of four textbooks, a course, and about a dozen articles about the nuts and bolts of how systems are compromised (hacked). He spent six years working my way up from adjunct to acting chair of the School of Computer Networking at a technical college in Atlanta GA, where he taught penetration testing, Python programming, and operating systems. In the last few years he has worked with large companies in the Financial and Communications Industries as a Principal Security Architect, focused generally on Compliance and Policy.This book is for you * If you own a small or mid-sized business* If you are a team manager, or a department director (including the CISO or the CIO)* If you do not work in an IT team, but use computers or mobile devices in the course of your work or home life* If you work in a highly regulated industry* If you have access at any time to patient medical records or to client financial records* If you have access to employee records (including your own)This book may not be for you * If you never use a computer or a mobile device to get on the Internet* If you represent any specific technical solution* If you are looking for ways to hack into computer systems (for this you need to get a copy of “Kali Linux: Windows Penetration Testing” by Halton and Weaver (2nd Edition 2018).”

Informacija

Autorius: Wolf Halton
Leidėjas: Independently published
Išleidimo metai: 2025
Knygos puslapių skaičius: 114
ISBN-13: 9781081316969
Formatas: 6 x 0.29 x 9 inches. Knyga minkštu viršeliu
Kalba: Anglų

Pirkėjų atsiliepimai

Parašykite atsiliepimą apie „How to Achieve Network Security: Using Risk Assessment and Game Theory to Protect Your Systems“

Būtina įvertinti prekę

Goodreads reviews for „How to Achieve Network Security: Using Risk Assessment and Game Theory to Protect Your Systems“