A Comprehensive Guide to Creating and Utilizing SBOMs for Enhanced Cybersecurity