Resilient Cybersecurity: Reconstruct your defense strategy in an evolving cyber world
Author:by Mark Dunkerley (Author)
Publisher finelybook 出版社:Packt Publishing
Edition 版本:N/A
Publication Date 出版日期:2024-09-27
Language 语言:English
Print Length 页数:752pages
ISBN-10:1835462510
ISBN-13:9781835462515
Book Description
Review
“A solid guide that covers modern security threats like ransomware and AI attacks in a way that’s easy to understand. The book doesn’t just throw technical solutions at you – it shows you how to build a complete security program step by step, including how to manage IoT devices and keep your team sharp. Great for both beginners and experienced pros who want to strengthen their company’s security.”
Joas Santos, Author of the book Defense Evasion Techniques
About the Author
Mark Dunkerley is a cybersecurity and technology leader with over 20 years of experience working in higher education, healthcare, and Fortune 100 companies. Mark has extensive knowledge in IT architecture and cybersecurity through delivering secure technology solutions and services. He has experience in cloud technologies, vulnerability management, vendor risk management, identity and access management, security operations, security testing, awareness and training, application and data security, incident and response management, regulatory and compliance, and more. Mark holds a master’s degree in business administration and has received certifications through (ISC)², AirWatch, Microsoft, CompTIA, VMware, AXELOS, Cisco, and EMC. Mark has spoken at multiple events, is a published author, sits on customer advisory boards, has published several case studies, and is featured as one of Security magazine’s 2022 Top Cybersecurity Leaders.
下载地址
相关推荐
CompTIA Network+ Certification Guide (Exam N10-009): Unleash your full potential as a network administrator – 2nd Edition
Edge Computing: Systems and Applications
SharePoint Online Administrator Playbook: A step-by-step approach to SharePoint Online administration
Deep Learning Applications in Medical Image Segmentation: Overview, Approaches, and Challenges
Digital Culture Shock: Who Creates Technology and Why This Matters
Cruising Along with Java: Modernize and Modularize with the Latest Features