The main audience of this book is for mid-level to senior management professionals in small to medium businesses that are looking to improve their IT and InfoSec operations utilizing a variation of military processes and concepts. It is also meant for future leaders in the industry to take another look at a holistic approach to improving IT operations in their organizations. No prior management or technical experience is assumed.