About the Reviewers
Abhishek Dey is a graduate student at the University of Florida conducting research in the fields of computer security, data science, Big Data analytics, analysis of algorithms, database system implementation, and concurrency and parallelism. He is a passionate programmer who developed an interest in programming and web technologies at the age of 15. He possesses expertise in JavaScript, AngularJS, C#, Java, HTML5, Bootstrap, Hadoop MapReduce, Pig, Hive, and many more. He is a Microsoft Certified Professional, Oracle Certified Java Programmer, Oracle Certified Web Component Developer, and an Oracle Certified Business Component Developer. He has served as a software developer at the McTrans Center at the University of Florida (http://www.ufl.edu/) where he contributed towards bringing new innovations in the field of Highway Capacity Software Development in collaboration with the Engineering School of Sustainable Infrastructure and Environment. In his leisure time, he can be found oil painting, giving colors to his imagination on canvas or traveling to different interesting places.
I'd like to thank my parents, Jharna Dey and Shib Nath Dey, without whom I am nothing. It's their encouragement and support that instills in me the urge to always involve in creative and constructive work, which helped me while working on this book.
Daniel W. Dieterle is an internationally published security author, researcher, and technical editor. He has over 20 years of IT experience and has provided various levels of support and service to numerous companies ranging from small businesses to large corporations. He authors and runs the CyberArms Security blog (cyberarms.wordpress.com).
Adriano dos Santos Gregório is an expert in the field of operating systems, is curious about new technologies, and is passionate about mobile technologies. Being a Unix administrator since 1999, he focuses on networking projects with emphasis on physical and logical security of various network environments and databases. He has also reviewed some other Packt Publishing books such as Kali Linux Cookbook, Cameron Buchanan. He is a Microsoft Certified MCSA and MCT Alumnus.
Thanks to my parents, my wife Jacqueline, and my stepchildren, for their understanding and companionship.
Aamir Lakhani is a leading cyber security architect and cyber defense specialist. He designs, implements, and supports advanced IT security solutions for the world's largest enterprise and federal organizations. He has designed offensive counter-defense measures for defense and intelligence agencies and has assisted many organizations in defending themselves from active strike-back attacks perpetrated by underground cyber criminal groups. He is considered an industry leader in support of detailed architectural engagements and projects on topics related to cyber defense, mobile application threats, malware, Advanced Persistent Threat (APT) research, and dark security.
He is the author of Web Penetration Testing with Kali Linux, Packt Publishing, and XenMobile MDM, Packt Publishing. He is also an active speaker and researcher at many of the top cyber security conferences around the world.
Aamir Lakhani runs and writes the popular cyber security blog, Doctor Chaos, at www.DrChaos.com. Doctor Chaos features all areas of dark security, hacking, and vulnerabilities. He has had numerous publications in magazines and has been featured in the media. You can find Aamir Lakhani, also known as Dr. Chaos, speaking at many security conferences around the world, on Twitter @aamirlakhani
, or on his blog.
I would like to dedicate my work to my dad. You have always been an inspiration in my life, supported me, and made me the man I am today. Thank you for always being proud of me, pushing me, and giving me everything I always wanted. I love you dad, and I am going to miss you, think of you, and honor you every day for the rest of my life. Love, your son.
Joseph Muniz is an engineer at Cisco Systems and a security researcher. He started his career in software development and later managed networks as a contracted technical resource. He moved into consulting and found a passion for security while meeting with a variety of customers. He has been involved with the design and implementation of multiple projects, ranging from Fortune 500 corporations to large federal networks.
He runs thesecurityblogger.com, a popular resource about security and product implementation. You can also find Joseph speaking at live events as well as being involved with other publications. Recent events include speaker for Social Media Deception at the 2013 ASIS International conference, speaker for the Eliminate Network Blind Spots with Data Center Security webinar, author of Web Penetration Testing with Kali Linux, Packt Publishing, and author of an article on Compromising Passwords in PenTest Magazine, Backtrack Compendium.
Outside of work, he can be found behind turntables scratching classic vinyl or on the soccer pitch hacking away at the local club teams.
My contribution to this book could not have been done without the support of my charismatic wife, Ning, and creative inspiration from my daughter, Raylin. I also must credit my passion for learning to my brother, Alex, who raised me along with my loving parents Irene and Ray. And I would like to give a final thank you to all of my friends, family, and colleagues who have supported me over the years.