Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems.
This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book’s ideas and put them to work.
Unit 1/Module 1
Cheruvu, S., Kumar, A., Smith, N., & Wheeler, D. M..(2020). Demystifying Internet of Things security: Successful IoT device/edge and platform security deployment. Apress.