This book is the culmination of years of experience in the information technology and cybersecurity field. Components of this book …