by Morey J. Haber, Apress 2018
The author works for a vendor of expensive computer security systems for large companies. In his role, he visits customer sites to install and customize the product. This book talks of the kinds of vulnerabilities these products address. But jump ahead to one of the last chapters, ‘Tales From the Trenches” and read this first to understand his point of view. Then you may want to read the rest of the book, which is strong on project management and customer support.
Apress needs to do more editing. It seems possible that no editing was done on this book, at least the parts that I read.