Nitesh Dhanjani is a well known security researcher, author, and speaker. Dhanjani is currently Senior Manager at a large consulting firm where he advises some of the largest corporations around the world on how to establish enterprise wide information security programs and solutions. Dhanjani is also responsible for evangelizing brand new technology service lines around emerging technologies and trends such as cloud computing and virtualization.
Prior to his current job, Dhanjani was Senior Director of Application Security and Assessments at a major credit bureau where he spearheaded brand new security efforts into enhancing the enterprise SDLC, created a process for performing source code security reviews & Threat Modeling, and managed the Attack & Penetration team.
Dhanjani is the author of "Network Security Tools: Writing, Hacking, and Modifying Security Tools" (O'Reilly) and "HackNotes: Linux and Unix Security" (Osborne McGraw-Hill). He is also a contributing author to "Hacking Exposed 4" (Osborne McGraw-Hill) and "HackNotes: Network Security". Dhanjani has been invited to talk at various information security events such as the Black Hat Briefings, RSA, Hack in the Box, Microsoft Blue Hat, and OSCON.
Dhanjani graduated from Purdue University with both a Bachelors and Masters degree in Computer Science.
Dhanjani's personal blog is located at dhanjani.com.
Billy Rios is currently a Security Engineer for Microsoft where he studies emerging risks and cutting edge security attacks and defenses. Before his current role as a Security Engineer, Billy was a Senior Security Consultant for various consulting firms including VeriSign and Ernst and Young. As a consultant, Billy performed network, application, and wireless vulnerability assessments as well as tiger team/full impact risk assessments against numerous clients in the Fortune 500.
Before his life as a consultant, Billy helped defend US Department of Defense networks as an Intrusion Detection Analyst for the Defense Information Systems Agency (DISA) and was an active duty Officer in the US Marine Corps (deployed in support of OIF in 2003). Billy s thought leadership includes speaking engagements at numerous security conferences including: Blackhat Briefings, RSA, Microsoft Bluehat, DEFCON, PacSec, HITB, the Annual Symposium on Information Assurance (ASIA), as well as several other security related conferences. Billy holds a Master of Science degree in Information Systems, a Master of Business Administration degree, and an undergraduate degree in Business Administration
Brett Hardin is a Security Research Lead with McAfee. At McAfee, Brett bridges security and business perspectives to aid upper management in understanding security issues. Before joining McAfee, Brett was a penetration tester for Ernst and Young's Advanced Security Center assessing web application and intranet security for Fortune 500 companies.
In addition, Brett also is the author of misc-security.com. A blog dedicated to focusing on security topics from a high-level or business-level perspective.
Brett holds a bachelor of science in Computer Science from California State University at Chico.
Book was as advertised, arrived as forecast, and was good value for the money. The book is a good addition to reference libraries.Published 2 months ago by Alex
Hacking: The Next Generation (Animal Guide) (Kindle Edition) ISBN: 978-0596154578 helps the reader look beyond common hacks prevalent in the past. Read morePublished 7 months ago by JonathanG
If you ever wanted to learn how hacking is performed, this book can give you a starting point. The chapters within, have a lot of details of various attacks anyone can do via... Read morePublished on July 31, 2012 by Ori Albin
"Be prepared, not scared" says one of the review quotes on the back of the book which I thought was really appropriate since this is a rather scary book. Read morePublished on December 15, 2011 by Stephen Chapman
Not too technical and very interesting. It made me think more about it security. Also it contains enough information to try some things out and "play" a hacker a bit.Published on June 16, 2011 by Ig Le
This is a truly fascinating insight into hacking of modern times. It really opened my eyes and mind to the possibilites of attacks out there these days. Read morePublished on May 4, 2011 by Chantelle
The core audience for the book is probably best defined as I.T. professionals in charge of protecting large systems, corporations or institution, but the nature of the book also... Read morePublished on April 18, 2011 by Berglund Center for Internet Studies
This was a good book, but written from a very high level. Much of the materiel presented is right on topic, but they cover quite a lot of it for such a thin book. Read morePublished on April 7, 2011 by R00k
This is the first book I have read that gave so much specific info as to how hackers do it. Some of the technical stuff was a bit complex looking for a non-coder. Read morePublished on January 19, 2011 by Jeff Bennett