25,64 €
28,49 €
-10% with code: EXTRA
How to Achieve Network Security
How to Achieve Network Security
25,64
28,49 €
  • We will send in 10–14 business days.
Now, more than ever, Leaders such as yourself must incorporate heightened awareness of cybersecurity into your daily life. Many things can be automated, and there are people hired to keep breaches to a minimum in your offices. This handbook is intended to alert you to a surprising amount of control you can assert in the seemingly unending cyber-barrage on your networks, your company and personal devices, as well as your clients' personally identifiable information.The author, Wolf Halton has be…
  • SAVE -10% with code: EXTRA

How to Achieve Network Security (e-book) (used book) | bookbook.eu

Reviews

Description

Now, more than ever, Leaders such as yourself must incorporate heightened awareness of cybersecurity into your daily life. Many things can be automated, and there are people hired to keep breaches to a minimum in your offices. This handbook is intended to alert you to a surprising amount of control you can assert in the seemingly unending cyber-barrage on your networks, your company and personal devices, as well as your clients' personally identifiable information.The author, Wolf Halton has been in Information Technology roles since before there was a named IT Industry. He holds a Master's Degree in IT Project Management and Leadership with a focus on Information Security. He has consulted with colleges to create graduate degrees (Master's and PhD) in IT Security. He has been lead author of four textbooks, a course, and about a dozen articles about the nuts and bolts of how systems are compromised (hacked). He spent six years working my way up from adjunct to acting chair of the School of Computer Networking at a technical college in Atlanta GA, where he taught penetration testing, Python programming, and operating systems. In the last few years he has worked with large companies in the Financial and Communications Industries as a Principal Security Architect, focused generally on Compliance and Policy.This book is for you * If you own a small or mid-sized business* If you are a team manager, or a department director (including the CISO or the CIO)* If you do not work in an IT team, but use computers or mobile devices in the course of your work or home life* If you work in a highly regulated industry* If you have access at any time to patient medical records or to client financial records* If you have access to employee records (including your own)This book may not be for you * If you never use a computer or a mobile device to get on the Internet* If you represent any specific technical solution* If you are looking for ways to hack into computer systems (for this you need to get a copy of "Kali Linux: Windows Penetration Testing" by Halton and Weaver (2nd Edition 2018)."

EXTRA 10 % discount with code: EXTRA

25,64
28,49 €
We will send in 10–14 business days.

The promotion ends in 21d.03:47:07

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 0,28 Book Euros!?

Now, more than ever, Leaders such as yourself must incorporate heightened awareness of cybersecurity into your daily life. Many things can be automated, and there are people hired to keep breaches to a minimum in your offices. This handbook is intended to alert you to a surprising amount of control you can assert in the seemingly unending cyber-barrage on your networks, your company and personal devices, as well as your clients' personally identifiable information.The author, Wolf Halton has been in Information Technology roles since before there was a named IT Industry. He holds a Master's Degree in IT Project Management and Leadership with a focus on Information Security. He has consulted with colleges to create graduate degrees (Master's and PhD) in IT Security. He has been lead author of four textbooks, a course, and about a dozen articles about the nuts and bolts of how systems are compromised (hacked). He spent six years working my way up from adjunct to acting chair of the School of Computer Networking at a technical college in Atlanta GA, where he taught penetration testing, Python programming, and operating systems. In the last few years he has worked with large companies in the Financial and Communications Industries as a Principal Security Architect, focused generally on Compliance and Policy.This book is for you * If you own a small or mid-sized business* If you are a team manager, or a department director (including the CISO or the CIO)* If you do not work in an IT team, but use computers or mobile devices in the course of your work or home life* If you work in a highly regulated industry* If you have access at any time to patient medical records or to client financial records* If you have access to employee records (including your own)This book may not be for you * If you never use a computer or a mobile device to get on the Internet* If you represent any specific technical solution* If you are looking for ways to hack into computer systems (for this you need to get a copy of "Kali Linux: Windows Penetration Testing" by Halton and Weaver (2nd Edition 2018)."

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)