About the Authors

Steven Arms (Chapter 7) is a contributor to Sensor Technology Handbook. Mr. Arms received his Master’s Degree in Mechanical Engineering at the University of Vermont in 1983. He has been awarded 25 US patents, and has over 10 pending. He has contributed to 18 journal publications as well as 44 abstracts/presentations in areas of advanced instrumentation, wireless sensing, and energy harvesting. Mr. Arms is founder and President of MicroStrain, Inc., a Vermont manufacturer of micro-displacement sensors, inertial sensing systems, and wireless data logging nodes for recording and transmitting strain, vibration, temperature, and orientation data. MicroStrain has been recognized as an innovator in the sensors industry – as of 2008 the firm has received nine (9) Best of Sensors Expo Gold awards for its new products. MicroStrain has received funding from the US Navy and US Army to develop wireless sensor networks which use strain energy harvesting to eliminate battery maintenance.

Alan Bensky, MScEE, (Chapter 4) is an electronics engineering consultant with over 30 years of experience in analog and digital design, management, and marketing. Specializing in wireless circuits and systems, Bensky has carried out projects for varied military and consumer applications and led the development of three patents on wireless distance measurement. Bensky has taught electrical engineering courses and gives lectures on radio engineering topics. He is the author of Short-range Wireless Communication, Second Edition, published by Elsevier in 2004, and has written several articles in international and local publications. He also wrote a recently published book on wireless location technologies and applications. Bensky is a senior member of IEEE.

Tony Bradley, CISSP-ISSAP (Chapter 22 and Appendix B) author of Essential Computer Security. He is the Guide for the Internet/Network Security site on About.com, a part of The New York Times Company. He has written for a variety of other Web sites and publications, including PC World, SearchSecurity.com, WindowsNetworking.com, Smart Computing magazine, and Information Security magazine. Currently a security architect and consultant for a Fortune 100 company, Tony has driven security policies and technologies for antivirus and incident response for Fortune 500 companies, and he has been network administrator and technical support for smaller companies. Tony is a CISSP (Certified Information Systems Security Professional) and ISSAP (Information Systems Security Architecture Professional). He is Microsoft Certified as an MCSE (Microsoft Certified Systems Engineer) and MCSA (Microsoft Certified Systems Administrator) in Windows 2000 and an MCP (Microsoft Certified Professional) in Windows NT. Tony is recognized by Microsoft as an MVP (Most Valuable Professional) in Windows security.

Praphul Chandra (Chapters 1, 17, 18, 19) author of Bulletproof Wireless Security works as a Research Scientist at HP Labs, India in the Access Devices Group. He joined HP Labs in April 2006. Prior to joining HP he was a senior design engineer at Texas Instruments (USA) where he worked on Voice over IP with specific focus on Wireless Local Area Networks. He is also the author of Wi-Fi Telephony: Challenges and Solutions for Voice over WLANs. He is an Electrical Engineer by training, though his interest in social science and politics has prompted him to concurrently explore the field of Public Policy. He maintains his personal website at www.thecofi.net.

Chris Hurley (Chapters 20 and 21) is the author of WarDriving: Drive, Detect, and Defend: A Guide to Wireless Security. Chris is a Principal Information Security Engineer working in the Washington, DC area. He is the founder of the WorldWide WarDrive, an effort by information security professionals and hobbyists to generate awareness of the insecurities associated with wireless networks. Primarily focusing his efforts on vulnerability assessments, he also performs penetration testing, forensics, and incident response operations on both wired and wireless networks. He has spoken at several security conferences, been published in numerous online and print publications, and been the subject of several interviews and stories regarding the WorldWide WarDrive. He is the primary organizer of the WarDriving Contest held at the annual DefCon hacker conference. Chris holds a bachelors degree in computer science from Angelo State University. He lives in Maryland with his wife of 14 years, Jennifer, and their daughter Ashley.

Steve Rackley (Chapters 2, 3 and 6) is the author of Wireless Networking Technology. He is an Independent Consultant.

James F. Ransome, CISM, CISSP (Chapters 1, 8, 13, 14, 15 and Appendix A) is the co-author of Wireless Operational Security. He is the Director of Information Technology Security at Qwest Communications.

John Rittinghouse, PhD, CISM (Chapters 1, 8, 13, 14, 15 and Appendix A) is the co-author of Wireless Operational Security. He is a Managing Partner at Rittinghouse Consulting Group, LLC.

Timothy Stapko (Chapter 9, 10, 11, 12, and 23) Engineering Manager, Digi International, CA, USA. Tim holds a MS degree in Computer Science from the University of California, Davis, and has over 8 years of experience in embedded systems software development. He was the sole developer on a ground-up implementation of Transport Layer Security (TLS/SSL) for the 8-bit Rabbit 3000 microprocessor and is also the author of Practical Embedded Security, a book focusing on the implementation of security for inexpensive embedded systems.

George L. Stefanek (Chapter 16) is the author of Information Security Best Practices. He is currently a consultant/developer of medical and scientific database systems.

Frank Thornton (Chapter 24) is the lead author of RFID Security and co-authored WarDriving: Drive, Detect, and Defend: A Guide to Wireless Security. Frank runs his own technology consulting firm, Blackthorn Systems, which specializes in wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Frank was also a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes.

Combining both professional interests, he was a member of the workgroup that established ANSI Standard “ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information.”

Chris Townsend (Chapter 7) is a contributor to Sensor Technology Handbook. He is Vice President of Engineering for MicroStrain, Inc., a manufacturer of precision sensors and wireless sensing instrumentation. Chris’s current main focus is on research and development of a new class of ultra low power wireless sensors for industry. Chris has been involved in the design of a number of products, including the world’s smallest LVDT, inertial orientation sensors, and wireless sensors. He holds over 25 patents in the area of advanced sensing. Chris has a degree in Electrical Engineering from the University of Vermont.

Jon Wilson (Chapter 7) is the author of Sensor Technology Handbook. Principal Consultant, Jon S. Wilson Consulting, LLC, Chandler, AZ. BSME, MAutoE, MSE(IE). Test Engineer, Chrysler Corporation; Test Engineer, ITT Cannon Electric Co.;Environmental Lab Manager, Motorola Semiconductor Products; Applications Engineering Manager and Marketing Manager, Endevco Corporation; Principal Consultant, Jon S. Wilson Consulting, LLC. Fellow Member, Institute of Environmental Sciences and Technology; Sr. Member ISA; Sr. Member, SAE. He has authored several text books and short course handbooks on testing and instrumentation, and many magazine articles and technical papers. Regular presenter of measurement and testing short courses for Endevco, Technology Training, Inc. and International Telemetry Conference as well as commercial and government organizations.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.250.1