Contents Acknowledgements Introduction Who Is This Book For? What Does This Book Cover? How This Book Is Structured What Do You Need to Use This Book? Conventions Source Code Errata xix xxi xxi xxii xxii xxv xxv xxv xxv Chapter 1: Unix Fundamentals
This document assumes you are working on a University of Edinburgh Sup-
ported Windows Desktop. The exercises may work in other environments
but this has not been tested. If following this document you may need to
search the Internet for additional m
Is “Agile Cybersecurity”Possible? - Strategic and Tactical Solutions
to Realizing AgilityCopyright 2018, by Syber Risk LLC
All rights reserved. No parts of this book may be reproduced or utilized in any form or by any means
electronic or mechanical,