Now, more than ever, Leaders such as yourself must incorporate heightened awareness of cybersecurity into your daily life. Many things can be automated, and there are people hired to keep breaches to a minimum in your offices. This handbook is intended to alert you to a surprising amount of control you can assert in the seemingly unending cyber-barrage on your networks, your company and personal devices, as well as your clients' personally identifiable information.The author, Wolf Halton has been in Information Technology ...
Read More
Now, more than ever, Leaders such as yourself must incorporate heightened awareness of cybersecurity into your daily life. Many things can be automated, and there are people hired to keep breaches to a minimum in your offices. This handbook is intended to alert you to a surprising amount of control you can assert in the seemingly unending cyber-barrage on your networks, your company and personal devices, as well as your clients' personally identifiable information.The author, Wolf Halton has been in Information Technology roles since before there was a named IT Industry. He holds a Master's Degree in IT Project Management and Leadership with a focus on Information Security. He has consulted with colleges to create graduate degrees (Master's and PhD) in IT Security. He has been lead author of four textbooks, a course, and about a dozen articles about the nuts and bolts of how systems are compromised (hacked). He spent six years working my way up from adjunct to acting chair of the School of Computer Networking at a technical college in Atlanta GA, where he taught penetration testing, Python programming, and operating systems. In the last few years he has worked with large companies in the Financial and Communications Industries as a Principal Security Architect, focused generally on Compliance and Policy.This book is for you * If you own a small or mid-sized business* If you are a team manager, or a department director (including the CISO or the CIO)* If you do not work in an IT team, but use computers or mobile devices in the course of your work or home life* If you work in a highly regulated industry* If you have access at any time to patient medical records or to client financial records* If you have access to employee records (including your own)This book may not be for you * If you never use a computer or a mobile device to get on the Internet* If you represent any specific technical solution* If you are looking for ways to hack into computer systems (for this you need to get a copy of "Kali Linux: Windows Penetration Testing" by Halton and Weaver (2nd Edition 2018)."
Read Less
Add this copy of How to Achieve Network Security: Using Risk Assessment to cart. $12.05, new condition, Sold by Ingram Customer Returns Center rated 5.0 out of 5 stars, ships from NV, USA, published 2019 by Independently Published.
Add this copy of How to Achieve Network Security: Using Risk Assessment to cart. $33.65, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Santa Clarita, CA, UNITED STATES, published 2019 by Independently published.