Who this book is for
This book is suitable for a variety of technical audiences, from system and network administrators in small and medium enterprises to cybersecurity students and even incident responders and cyber threat intelligence analysts who want to learn more about human-operated ransomware attacks.