|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Richard Stiennon (University of Michigan, USA; King's College, London, UK)Publisher: John Wiley & Sons Inc Imprint: John Wiley & Sons Inc Edition: 6th edition Dimensions: Width: 19.60cm , Height: 3.30cm , Length: 23.90cm Weight: 0.885kg ISBN: 9781394334865ISBN 10: 1394334869 Pages: 528 Publication Date: 28 March 2025 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsAcknowledgments xiii 1 2024 in Review 1 2 Introduction 7 3 Getting to Know the IT Security Industry 11 4 A Brief History of the IT Security Industry 23 5 The History of Network Security 29 6 DDoS Defense 57 7 Endpoint Protection from AV to EDR 61 8 Identity and Access Management 79 9 Data Security 85 10 Governance, Risk, and Compliance 99 11 Managed Security Services 107 12 Open- Source Security 117 13 Fast 50 Under 50 125 14 The 2025 Cyber 150 129 15 Failures 139 16 In Memoriam 143 17 2024 Mergers and Acquisitions 145 18 2024 Funding 167 19 Significant Cyber Incidents in 2024 185 20 Research Methodology 195 21 Directory A– Z 199 22 Directory by Country 305 23 Directory by Category 413ReviewsAuthor InformationAbout the Author RICHARD STIENNON played his own part in the IT security industry starting in 1995 at Netrex, one of the first MSSPs. He was a Manager of Technical Risk Services at PwC before being drafted into Gartner in 2000 to cover the network security industry. He left Gartner in 2004 to join Webroot Software as VP of Threat Research. He has also had roles as Chief Marketing Officer at Fortinet, and Chief Strategy Officer at data erasure company, Blancco Technology Group. He is an aerospace engineer (University of Michigan, 1982) turned historian (King’s College, London, 2014). He is Chief Research Analyst at IT-Harvest, a SaaS solution for tracking the entire cybersecurity industry. Tab Content 6Author Website:Countries AvailableAll regions |