The Rheinwerk Computing series offers new and established professional comprehensive guidance to enrich the readers' skillsets and enhance their career prospects. Their publications are written by leading experts in the fields of programming, administration, security, analytics, and more. Each book is detailed and hands-on to help readers develop essential, practical skills that they can apply to their daily work.
Michael Kofler is one of the most renowned IT authors in the German-speaking world. He is also an administrator and software developer. Michael teaches at FH Joanneum University in Kapfenberg. He designed this book and wrote seven chapters on basic topics as well as topics related to Linux.
Klaus Gebeshuber is a professor of IT security at FH Joanneum University in Kapfenberg, Austria. He focuses on network security, industrial security, security analysis, and penetration testing. Klaus holds numerous industry certifications in IT security and penetration testing. In this book, he covers the topics of exploits, security in wireless networks (WLAN/Bluetooth), security in web applications, bug bounty programs, and dealing with passwords in five chapters.
Peter Kloep is an outstanding expert for secure Windows infrastructures in Germanspeaking countries. Peter has been a Microsoft Certified Trainer since 2002 and has conducted numerous technical trainings on Windows administration. In this book, he explains how you can securely configure Windows Server and Active Directory installations.
Frank Neugebauer looks back on many years of service as an officer in the German Armed Forces. There he worked in the field of IT security for more than 25 years, serving as an IT security officer, systems engineer at NATO headquarters, and leader of an incident response team, among other positions. As a member of the Computer Emergency Response Team, he participated in vulnerability assessments on many Armed Forces networks. Most recently, he served as an incident handler at the Armed Forces Cyber Security Center. Frank currently works as a consultant and external contractor. For this book, he wrote a chapter on the “Attack Vector USB Interface” as well as sections in other chapters on “Empire”, “Koadic” and “Pwnagotchi.”
André Zingsheim is a principal security consultant at TÜV TRUST IT GmbH. In addition to technical security analyses/penetration tests of IT systems and infrastructures, he is deeply involved in the security of mobile devices. André is a penetration tester certified by the German Federal Office for Information Security (BSI) and a Certified Information Systems Security Professional (CISSP). In this book, he shares his hacking and security expertise in the area of mobile devices (Android and iOS/iPadOS).
Thomas Hackner is the managing director of HACKNER Security Intelligence GmbH, a company he founded in 2010 after completing his studies in secure information systems in Hagenberg, Upper Austria. Thomas is a regular contributor to international red-teaming projects and penetration testing, where IT networks and web applications as well as SCADA systems are tested for security. In this book, he describes the objectives and execution of penetration testing in two chapters.
Markus Widl has been working as a consultant, developer, and trainer in IT for about 20 years. His focus is on cloud technologies such as Microsoft 365 and Azure. He has gained a high reputation through his expert workshops, conference presentations, and authoring activities. In this book, he demonstrates how you can avoid security issues when using Microsoft's cloud products.
Roland Aigner is an expert in secure IoT infra-structures. He has developed firmware and software for medical in vitro diagnostics, is a member of the Bluetooth SIG and a coauthor of its standards, and is a founding member of the NFC Forum, where he focused specifically on ticketing and communications security. He works as a lead software architect in the secure communications sector and is a consultant for IoT, RFID, and NFC projects. Roland contributed the IoT chapter to the book.
Stefan Kania has been working as a consultant and trainer since 1997. His focus is on the secure implementation of Samba, LDAP, and Kerberos as well as training on the topics. Stefan is the author of the Samba manual and conducts training and consulting projects. In this book, he demonstrates how you can securely integrate Samba servers into Windows networks.
Tobias Scheible is a security researcher and lecturer for cyber security and IT forensics and has been working at Albstadt-Sigmaringen University for more than 10 years. There he is active at the Institut für Wissenschaftliche Weiterbildung (IWW) in the in-service certificate program and teaches in special online modules. He also gives lectures and conducts workshops. Tobias authored the book Hardware & Security, also published by Rheinwerk Verlag. In this book, he wrote the chapter on IT forensics.
Matthias Wübbeling is an IT security enthusiast, scientist, author, entrepreneur, consultant, and speaker. As an academic councilor at the University of Bonn and researcher at Fraunhofer FKIE, he researches and teaches in the areas of network security, IT security awareness, and identity theft. With the University of Bonn spin-off Identeco, he provides stolen identity data to protect employee and customer accounts against payment defaults due to identity fraud. In this book, Matthias describes the use of Snort for intrusion detection.