To get the most out of this book
- Existing cyber security planners and strategists will gain insight into the reality of the space and will be better able to understand how future innovations part of that future state will be.
- This is not a how-to guide; the author does not wish to provide readers with knowledge that could potentially be turned to malicious purposes, but rather this book aims to provide the reader with a new perspective, to see and prepare for what is coming, rather than to be blinded by the threats that are more imminent.
- Cyber security experience is assumed; however, the book also features introductory concepts, which even beginners can take advantage of.
Download the color images
We also provide a PDF file that has color images of the screenshots/diagrams used in this book. You can download it here: https://static.packt-cdn.com/downloads/9781839216992_ColorImages.pdf.
Conventions used
CodeInText
: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. For example: "Changeme.py
focuses on detecting default and backdoor credentials, and not just common account credentials."
Bold: Indicates a new term, an important word, or words that you see on the screen, for example, in menus or dialog boxes, also appear in the text like this. For example: "The first, and arguably most important, technology is commonly called Software-Defined Networking (SDN)."