About the Contributing Authors

Craig Balding is a full-time security practitioner employed by one of the largest banking and finance companies in the world. This role has taken Craig around the world, from Eastern Europe to Asia. In addition to heading up Unix security, he is responsible for IDS strategy, technical e-business security assessments, and penetration testing. Craig has worked with Unix for some eight years in multivendor environments across diverse sectors. He has been at the sharp end, working on high-end, mission-critical Unix servers and multiterrabyte databases. When he’s not submerged in geeky stuff, he loses himself in a world of sound synthesis—Craig loves techno.

Billy Barron () is a principal Java/OO consultant for Delphi Consultants, LLC (http://www.delphis.com/). He founded the Java Metroplex User Group (JavaMUG at http://www.javamug.org/) and was the first Webmaster in the Dallas/Fort Worth area. He has coauthored and tech-edited numerous books including Web Programming Unleashed, Tricks of the Internet Gurus, Maximum Java 1.1, Web Commerce Unleashed, Creating Web Applets with Java, and Internet Unleashed.

Robert Blader has worked for more than 15 years at the Naval Surface Warfare Center. For nearly 3 years he has worked in the Information Systems Security Office, which performs intrusion detection and risk management for systems and networks on the base, as well as security training and forensics. For 10 years prior to that, he worked as a systems administrator for the Trident missile project. He has contributed to SANS GIAC courses and SysAdmin magazine. He holds a bachelor’s degree in computer science from Long Island University.

Chad Cook is co-founder and chief security architect of Zetari Inc., where he is responsible for product security, software design, and development. Prior to starting Zetari Inc., he was a senior member of the Internet security consulting firm @stake, where he worked in research and development and on client solutions. He has developed new security technologies and published papers on numerous security topics, including secure product design, vulnerability analysis, and encryption. Chad has 10 years of experience in the Internet security field with emphasis on secure product architecture, network and operating system security, and the research and development of new security technologies with companies including BBN, GTE, and Infolibria.

Jonathan Feldman is the author of Sams Teach Yourself Network Troubleshooting in 24 Hours and Que’s Network+ Exam Guide. He is a contributing editor with Network Computing magazine, where he writes a column and frequently contributes technical workshops. He enjoys living in Savannah, Georgia, working as chief technical manager for Chatham County, where he handles the practical and political aspects of network security on a daily basis. In his copious spare time, he enjoys running, cooking, and playing the guitar, but not all at the same time. He can be reached at .

David Harley () manages security for a major cancer research organization in the United Kingdom. He also works with TruSecure (formerly ICSA), the WildList Organization, and the European Institute for Computer Anti-virus Research. He maintains a number of virus- and security-related information resources at sherpasoft.org.uk and macvirus.com, and a security alert verification service at security-sceptic.org.uk. He writes regularly for Virus Bulletin and is a frequent speaker at security conferences. His book Viruses Revealed (with Robert Slade and Urs Gattiker) was published in late 2001. He lives in London with his 11-year-old daughter.

Joe Jenkins is a system administrator/security consultant with NoWalls, Inc. (http://www.nowalls.inc). Joe has been dealing with network security since 1993, conducting in-depth security audits and consulting on various aspects of intrusion detection, perimeter defense, and policy. Joe routinely writes for online security magazines, notably SecurityFocus, and has also worked as a programmer and hardware engineer.

L.J. Locher began working with mainframe and personal computers in the mid-1980s, and has since been employed as a network administrator, programmer, and security consultant for mainframe systems and PC LANs. Now a full-time author and editor, L.J. has contributed to numerous books and articles for various publishers including Microsoft Press and Windows 2000 magazine.

Toby Miller is a security engineer for Advanced Systems Development. Toby holds a bachelor’s degree in computer information systems and is working toward his master’s degree. Toby is a contributing author for Intrusion Signatures and Analysis (New Riders). Toby is also the author of many papers published for SecurityFocus.com and the SANS Institute. Toby works as an MCP and a GIAC analyst.

Brooke Paul began working in information technology as a systems and network administrator at the University of California. Due to the loose nature of university security at the time, he experienced several security incidents within his first few months on the job. He quickly learned about the limitations of TCP/IP security and the lack of security in most vendors’ default operating system configurations. Taking this as a challenge, he began working on improving the security of the systems and networks under his care. He now works as an information technology and security consultant and frequently publishes articles about security in technology trade magazines.

Nicholas Raba goes by the handle Freaky. Nicholas originally started writing by creating an underground printed publication, and from there created the Web site Freak’s Macintosh Archives. Nicholas loves security, and MacOS just so happened to be the niche category he chose to specialize in. He created SecureMac.com and ever since then has been writing security articles covering all aspects of the MacOS for that Web site and various magazines. Nicholas has also given speeches for Defcon 7 and Defcon 8 on Macintosh hacking/security. He says, “Thanks to Rie, who pushed me to contribute to this book.” You can reach Nicholas with any questions/comments about Macintosh security at .

Greg Shipley is a native Chicagoan. Greg was introduced to the world of computers through a dangerous fixation with video games and taught himself assembly on his Commodore 64. After spending a number of years studying computer science, Greg moved into the world of network engineering and Internet security. Today, Greg serves as the CTO for Neohapsis, a U.S.-based information security consultancy. When he’s not immersed in the seas of corporate security storms, he’s busy at work performing product testing in the Neohapsis/Network Computing Chicago lab. Greg would like to send his greetings to the people of Molokai, as they helped him gain some much-needed perspective during the early stages of this book.

Gregory B. White, Ph.D., joined SecureLogix in March 1999. He serves as the Vice President of Professional Services. Before joining SecureLogix, he was the deputy head of the computer science department and an associate professor of computer science at the United States Air Force Academy in Colorado Springs, Colorado. While at the Academy, Dr. White was instrumental in the development of two courses on computer security and information warfare. He also ensured that security was taught throughout the computer science curriculum. During his two tours at the Academy, he authored a number of papers on security and information warfare, and is a coauthor for two textbooks on computer security.

Dr. Cyrus Peikari finished his formal training with honors in electrical engineering from Southern Methodist University in 1991. For eight years Dr. Peikari taught advanced mathematics at the SMU Learning Enhancement Center in Dallas, Texas. He has also worked as a telecommunications software research and development engineer for Alcatel. Dr. Peikari has developed several award-winning security software programs. He also co-founded DallasCon, the largest annual wireless security conference in the Southwest. You can reach him at .

Brett L. Neilson is a network and system engineer with a strong background in the wireless industry. Mr. Neilson has previously worked for Verizon Wireless as a Senior Systems Administrator and RF Field Technician. While at Verizon he worked to develop, deploy, and maintain their national infrastructure. Currently Mr. Neilson works for a leading infosec corporation. As an FCC licensed amateur radio operator, he has worked with various government agencies providing communication assistance and coordination. His broad range of computer and RF skills has led him to perform groundbreaking research in practical wireless security. Mr. Neilson also teaches a series of review courses for the Wireless Security Expert Certification (WSEC).

Jim Cooper, MCSE, has over 15 years of information technology experience and specializes in Microsoft Windows Active Directory and Exchange design. He is one of the founders and current Senior Engineer of Micradex Systems, a network and domain outsourcing and design company headquartered in Charlotte, North Carolina. Jim is a frequent contributor of chapters for Pearson Technology Group and has also provided technical editing for numerous other titles.

Greg Vaughn just transitioned into corporate employment at LandSafe, Inc. after eight years as a consultant in Austin and Dallas, Texas, looking to make a positive long-term impact on development and security practices. He’s an accomplished conference speaker, and now that his first child has turned two years old, he’s finding some time to write. He earned an M.S. degree from Texas Tech University, and during his consulting career has worked on a huge range of devices, from PDAs to enterprise servers.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.150.231