Reader small image

You're reading from  Cybersecurity Architect's Handbook

Product typeBook
Published inMar 2024
PublisherPackt
ISBN-139781803235844
Edition1st Edition
Right arrow
Author (1)
Lester Nichols
Lester Nichols
author image
Lester Nichols

Lester E. Nichols III currently resides in North Texas and is the Director Security Architecture/VP Cybersecurity Operations at JPMorgan Chase & Co. Previous experience includes the Director of IT Infrastructure and Security for a development company, SOC oversight manager/Senior Infrastructure Officer within DHS and previous experience in Local/Federal/DoD/financial sectors. Lester has post graduate education with a Master's of Science Degree in Information Assurance from Norwich University, the oldest private military school in the United States, and multiple industry certifications including CISSP and SANS certs, as well as others. Lester is also a contributing author to the Computer Security Handbook 5th-6th Editions by Wiley Press.
Read more about Lester Nichols

Right arrow

Conventions used

There are a number of text conventions used throughout this book.

Code in text: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: “After running the setup script, run sudo gvm-check-setup for validation of the installation and default configuration.”

A block of code is set as follows:

{
      "v": "1",
      "type": {
        "name": "pipeline_rule",
        "version": "1"
      },

When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:

{
      "v": "1",
      "type": {
        "name": "pipeline_rule",
        "version": "1"
      },

Any command-line input or output is written as follows:

    sudo systemctl enable graylog-server.service
    sudo systemctl start graylog-server.service
sudo systemctl --type=service --state=active | grep graylog

Bold: Indicates a new term, an important word, or words that you see onscreen. For instance, words in menus or dialog boxes appear in bold. Here is an example: “Cryptography is the science of, and some even say the art of, using deception and mathematics to hide data from unwanted access.

Tips or important notes

Appear like this.

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Cybersecurity Architect's Handbook
Published in: Mar 2024Publisher: PacktISBN-13: 9781803235844

Author (1)

author image
Lester Nichols

Lester E. Nichols III currently resides in North Texas and is the Director Security Architecture/VP Cybersecurity Operations at JPMorgan Chase & Co. Previous experience includes the Director of IT Infrastructure and Security for a development company, SOC oversight manager/Senior Infrastructure Officer within DHS and previous experience in Local/Federal/DoD/financial sectors. Lester has post graduate education with a Master's of Science Degree in Information Assurance from Norwich University, the oldest private military school in the United States, and multiple industry certifications including CISSP and SANS certs, as well as others. Lester is also a contributing author to the Computer Security Handbook 5th-6th Editions by Wiley Press.
Read more about Lester Nichols