Zum Hauptinhalt springen

Bundles zum Oster-Preis – jetzt sparen >

Unsere Autoren

Haydar Yener Arici

Haydar Yener Arici

Haydar Yener Arıcı is a senior systems and cybersecurity specialist with more than 23 years of experience in IT infrastructure, system administration, digital forensics, and open-source intelligence (OSINT). Throughout his career, he has conducted extensive work in critical areas such as the design, operation, and security of enterprise IT infrastructures; digital evidence analysis; and the establishment and development of corporate cybersecurity processes. Haydar holds one bachelor’s degree and three master’s degrees, combining his academic background with extensive field experience to develop projects at both technical and strategic levels. He is the author of six books published in Turkey covering Windows Server administration, enterprise IT security, and digital evidence management. These works serve as important reference resources for system administrators, cybersecurity professionals, and digital forensics specialists, and are widely used within the industry. For many years, Haydar served as a Microsoft Certified Trainer (MCT), during which he delivered advanced training to numerous IT professionals in system administration, infrastructure security, and enterprise security architectures. He has also collaborated with universities and academic institutions, providing training, consultancy, and academic contributions in areas such as forensic readiness, cybersecurity policy development, and enterprise system hardening. Haydar continues his work by combining technical expertise with academic knowledge and field experience, focusing on enterprise security architectures, digital forensics, and advanced system security.

Aktuelle Titel

  • Cover von Cyber Threat Intelligence

    Cyber Threat Intelligence

    von Haydar Yener Arici

    600 Seiten, broschiert
    E-Book-Formate: PDF, EPUB, Online

    ca. € 79,95

    Vorbestellbar
    Lieferbar ab 07.09.2026

    Buch | E-Book

    • Understand the cyber intelligence lifecycle and get to know your sources: OSINT, HUMINT, and SIGINT
    • Develop threat models and conduct forensic analysis of network data and host systems to detect malicious behavior
    • Integrate CTI into incident response, explore threat hunting, and see how automation can improve your CTI workflows