To get the most out of this book
- You’ll already understand basic IT concepts and have some experience of using, implementing, and/or operating IT systems and applications.
- Possessing some knowledge of basic cybersecurity concepts will make this book an easier read.
- Experience of managing enterprise IT, compliance, and/or cybersecurity teams will be helpful, but is not strictly required.
- You’ll bring curiosity and the desire to learn about key aspects of cybersecurity that CISOs and CSOs of large organizations manage in the course of doing their jobs.
Download the color images
We also provide a PDF file that has color images of the screenshots/diagrams used in this book. You can download it here: https://packt.link/INq4w.
Conventions used
There are a number of text conventions used throughout this book.
CodeInText
: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. For example: “Attackers could be registering and using domain names in this ccTLD to catch web browser users that type .om
instead of .com
.”
Any code snippet is written as follows:
void func(int index, int value)
{
char buf[4];
buf[index] = value;
}
Bold: Indicates a new term, an important word, or words that you see on the screen. For instance, words in menus or dialog boxes appear in the text like this. For example: “DevOps typically includes concepts like continuous testing, Continuous Integration (CI), Continuous Delivery (CD), continuous deployment, and continuous performance monitoring.”
Warnings or important notes appear like this.
Tips and tricks appear like this.