About the Authors

Lead Author

Rob Kraus (CISSP, CEH, MCSE) is a senior security consultant for Solutionary, Inc. Rob is responsible for organizing customer requirements, on-site project management, and client support while ensuring quality and timeliness of Solutionary's products and services.

Rob was previously a remote security services supervisor with Digital Defense, Inc. He performed offensive-based security assessments consisting of penetration testing, vulnerability assessment, social engineering, wireless and VoIP penetration testing, Web application penetration tests, and vulnerability research. As a supervisor, Rob was also responsible for leading and managing a team of penetration testers who performed assessment services for Digital Defense's customers.

Rob's background also includes contracting as a security analyst for AT&T during the early stages of the AT&T U-verse service as well as provisioning, optimizing, and testing OC-192 fiber-optic networks while employed with Nortel Networks.

Rob also speaks at information security conferences and universities in an effort to keep the information security community informed of current security trends and attack methodologies.

Rob is currently attending the University of Phoenix, completing his Bachelor of Science in Information Technology/Software Engineering and resides in San Antonio, TX with his wife Kari, son Soren, and daughter Kylee.

Technical Editor

Chris Griffin (OPST, OPSA, CEH, CISSP) is an Institute for Security and Open Methodologies (ISECOM) trainer, teaching the OSSTMM-based certifications and a contributing author to Hacking Exposed™ Linux: Linux Security Secrets & Solutions, Third Edition (ISBN 978-0072262575). Chris has been an OSSTMM contributor for the past 6 years and a trainer for 2 years.

Chris is a member of his local ISSA and InfraGard organizations in Indianapolis, IN. He also performs penetration and security tests based on the OSSTMM and explains to organizations how to better secure their environments and quantify their security.

Contributing Authors

Brian Barber (MCSE, MCP+I, MCNE, CNE-5, CNE-4, CNA-3, CNA-GW) works for the Canada Deposit Insurance Corporation (CDIC) as a project manager and as a program manager for CDIC's IT Service Management and intervention logistics programs, specializing in service provisioning, IT security, and infrastructure architecture. In the past, he has held the positions of principal consultant at Sierra Systems Group Inc., senior technical analyst at MetLife Canada, and senior technical coordinator at the LGS Group Inc. (now a part of IBM Global Services).

Brian is an experienced instructor and courseware developer, and has been co-author, technical editor, or lead author for over 15 books and certification guides. Recently, he was the Lead Author for Syngress' CompTIA Linux+ Certification Study Guide: Exam XK0-003 (ISBN: 978-1-59749-482-3) and a contributing technical editor for Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity (ISBN: 978-1-59749-418-2), and Cisco CCNA/CCENT: Exam 640-802, 640-822, 640-816 Preparation Kit (ISBN: 978-1-59749-306-2).

Brian wishes to thank his family for all the support and patience they showed while he contributed to this book, and Victor and James at work for providing and supporting the hardware and software he needed.

Mike Borkin (CCIE#319568, MCSE) is a director at PigDragon Security, a computer security consulting company, and an internationally known speaker and author. In his professional life, Mike has worked on developing strategies and securing the infrastructures of many different Fortune 500 companies at both an architectural and engineering level. He has spoken at conferences in the United States and Europe for various industry groups including SANS, The Open Group, and RSA. This is his third book, having also contributed to Seven Deadliest Network Attacks (Syngress, ISBN: 978-1-59749-549-3) and co-authored Windows Vista® Security for Dummies®.

Mike wishes to thank the co-authors and editors of this book for their dedication and all of the hard work that went into bringing it to fruition. He also wants to thank his friends and family for putting up with him during the process, and especially Melissa (||) for what she has to deal with on an everyday basis. He hopes that the information in this book provides you with a better understanding of how to secure Microsoft environments while still taking the time to entertain.

Naomi J. Alpern currently works for Microsoft Consulting Services as a senior consultant specializing in Unified Communications and IT Architecture and Planning. Naomi engages face-to-face with Microsoft business customers, assisting them in the successful planning and deployment of Microsoft products. Since the start of her technical career, she has worked in many facets of the technology world, including IT administration, technical training, and, most recently, full-time consulting. Naomi holds a Bachelor of Science in Leisure Services Management from Florida International University. Additionally, she holds many Microsoft certifications, including an MCSE and MCT, as well as other industry certifications such as Citrix Certified Enterprise Administrator, Security+, Network+, and A+. Naomi lives in Charlotte, NC, where she spends her spare time along with her husband, Joey, chasing after their two young sons, Darien, 5, and Justin, 2. On the odd occasion that she runs into some alone time, she enjoys curling up with a cheesy horror or mystery novel for company.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.205.99