This volume is easy to read and quite pedagogical, which is maybe its greatest strength, together with putting together some examples and preparing the reader for them. Therefore, it is strongly recommended to chief information officers and IT operations and network operations directors, to ensure in-house information security processes are comprehensive enough. Next, it is also strongly recommended as a supplementary practice-oriented textbook for students in computer and information security, to guide them along in their perfection of this art. (L.-F. Pau, Computing Reviews, April, 2017)