About the Author

Kevin Beaver is an independent information security consultant, expert witness, professional speaker, and writer with Atlanta-based Principle Logic, LLC. He has over three decades of experience in IT and has spent a quarter of a century working in security. Kevin specializes in performing independent information security assessments for corporations, security product vendors, software developers/cloud service providers, government agencies, nonprofit organizations, among others. Before starting his information security consulting practice in 2001, Kevin served in various information technology (IT) and security roles for several healthcare, e-commerce, financial, and educational institutions.

Kevin has appeared on CNN television as an information security expert and has been quoted in The Wall Street Journal, Entrepreneur, Fortune Small Business, Women's Health, and on Inc. magazine’s technology site, IncTechnology.com. Kevin’s work has also been referenced by the PCI Council in their Data Security Standard Wireless Guidelines. Kevin has been a top-rated speaker, giving hundreds of presentations and panel discussions for IT and security seminars, conferences, and webcasts over the past decade and a half.

Kevin has authored or co-authored 12 information security books, including Hacking Wireless Networks For Dummies, Implementation Strategies for Fulfilling and Maintaining IT Compliance (Realtimepublishers.com), and The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). Kevin has written more than three dozen whitepapers and over 1,000 articles and guest blog posts for sites such as TechTarget’s SearchSecurity.com, SearchEnterpriseDesktop.com, and SearchSoftwareQuality.com, Ziff Davis’ Toolbox.com, as well as IBM’s SecurityIntelligence.com. Kevin is the creator and producer of the Security On Wheels audiobooks, which provide security learning for IT professionals on the go (securityonwheels.com), and the Security On Wheels blog (securityonwheels.com/blog). He also covers information security and related matters on Twitter (@kevinbeaver) and YouTube (PrincipleLogic). Kevin earned his bachelor’s degree in Computer Engineering Technology from Southern College of Technology and his master’s degree in Management of Technology from Georgia Tech. He has obtained his CISSP certification in 2001 and also holds MCSE, Master CNE, and IT Project+ certifications.

Kevin can be reached through his website, https://www.principlelogic.com, and you can connect to him via LinkedIn at https://www.linkedin.com/in/kevinbeaver.

Dedication

This one is for my clients. I want to express my sincere appreciation to each and every one of you for continuing to hire me, the “no-name-brand” consultant, and keeping me around over the long haul. I wouldn’t be here without your willingness to break out of the “must hire big company” mindset and your continued support over the years. Thank you so much!

Author’s Acknowledgments

As always, mega thanks to Amy, Garrett, and Mary Lin for the love, support, and humor you bring to my life each and every day. I love each of you 100 percent!

I’d also like to thank Amy Fandrei, my acquisitions editor, for continuing this project and presenting me the opportunity to shape this book into something I’m very proud of. I’d like to thank my project editor, Chrissy Guthrie. It has been a real pleasure! Kudos to my copy editor, Kathy Simpson, for keeping my thoughts and words in check. Also, many thanks to my technical editor, business colleague, friend, and co-author of Hacking Wireless Networks For Dummies, Peter T. Davis. As with the previous five versions of this book, it’s great working with you — thanks for keeping me in line!

Much gratitude and appreciation to Nicky Sciberras with Acunetix, Robert Abela with Netsparker; Nate Crampton with Rapid7; Vladimir Katalov and Olga Koksharova with ElcomSoft; Kirk Thomas with Northwest Performance Software; David Vest with Mythicsoft; Michael Berg with TamoSoft; and Oliver Muenchow, Colin Bastable, and Palo Stacho at LUCY Security for responding to all of my requests. Also, many thanks to Dave Coe for your help in keeping me current on the latest security tools and techniques. Much gratitude to all the others I forgot to mention as well!

Publisher’s Acknowledgments

Acquisitions Editors: Amy Fandrei and Steven Hayes

Editorial Project Manager and Development Editor: Christina N. Guthrie

Copy Editor: Kathy Simpson

Technical Editor: Peter T. Davis

Production Editor: Siddique Shaik

Cover Image: © matejmo/Getty Images

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.137.187.233