Authors
The Rheinwerk Computing series offers new and established professional
comprehensive guidance to enrich the readers' skillsets and enhance their career prospects.
Their publications are written by leading experts in the fields of programming, administration,
security, analytics, and more. Each book is detailed and hands-on to help readers develop
essential, practical skills that they can apply to their daily work.Kofler Michael :
Michael Kofler is one of the most renowned IT authors in the German-speaking
world. He is also an administrator and software developer. Michael teaches at FH Joanneum
University in Kapfenberg. He designed this book and wrote seven chapters on basic topics as well
as topics related to Linux.Gebeshuber Klaus :
Klaus Gebeshuber is a professor of IT security at FH Joanneum University in
Kapfenberg, Austria. He focuses on network security, industrial security, security analysis, and
penetration testing. Klaus holds numerous industry certifications in IT security and penetration
testing. In this book, he covers the topics of exploits, security in wireless networks
(WLAN/Bluetooth), security in web applications, bug bounty programs, and dealing with passwords
in five chapters.Kloep Peter :
Peter Kloep is an outstanding expert for secure Windows infrastructures in
Germanspeaking countries. Peter has been a Microsoft Certified Trainer since 2002 and has
conducted numerous technical trainings on Windows administration. In this book, he explains how
you can securely configure Windows Server and Active Directory installations.Neugebauer Frank :
Frank Neugebauer looks back on many years of service as an officer in the
German Armed Forces. There he worked in the field of IT security for more than 25 years, serving
as an IT security officer, systems engineer at NATO headquarters, and leader of an incident
response team, among other positions. As a member of the Computer Emergency Response Team, he
participated in vulnerability assessments on many Armed Forces networks. Most recently, he
served as an incident handler at the Armed Forces Cyber Security Center. Frank currently works
as a consultant and external contractor. For this book, he wrote a chapter on the “Attack Vector
USB Interface” as well as sections in other chapters on “Empire”, “Koadic” and
“Pwnagotchi.”Zingsheim André :
André Zingsheim is a principal security consultant at TÜV TRUST IT GmbH. In
addition to technical security analyses/penetration tests of IT systems and infrastructures, he
is deeply involved in the security of mobile devices. André is a penetration tester certified by
the German Federal Office for Information Security (BSI) and a Certified Information Systems
Security Professional (CISSP). In this book, he shares his hacking and security expertise in the
area of mobile devices (Android and iOS/iPadOS).Hackner Thomas :
Thomas Hackner is the managing director of HACKNER Security Intelligence GmbH,
a company he founded in 2010 after completing his studies in secure information systems in
Hagenberg, Upper Austria. Thomas is a regular contributor to international red-teaming projects
and penetration testing, where IT networks and web applications as well as SCADA systems are
tested for security. In this book, he describes the objectives and execution of penetration
testing in two chapters.Widl Markus :
Markus Widl has been working as a consultant, developer, and trainer in IT for
about 20 years. His focus is on cloud technologies such as Microsoft 365 and Azure. He has
gained a high reputation through his expert workshops, conference presentations, and authoring
activities. In this book, he demonstrates how you can avoid security issues when using
Microsoft's cloud products.Aigner Roland :
Roland Aigner is an expert in secure IoT infra-structures. He has developed
firmware and software for medical in vitro diagnostics, is a member of the Bluetooth SIG and a
coauthor of its standards, and is a founding member of the NFC Forum, where he focused
specifically on ticketing and communications security. He works as a lead software architect in
the secure communications sector and is a consultant for IoT, RFID, and NFC projects. Roland
contributed the IoT chapter to the book.Kania Stefan :
Stefan Kania has been working as a consultant and trainer since 1997. His focus
is on the secure implementation of Samba, LDAP, and Kerberos as well as training on the topics.
Stefan is the author of the Samba manual and conducts training and consulting projects. In this
book, he demonstrates how you can securely integrate Samba servers into Windows
networks.Scheible Tobias :
Tobias Scheible is a security researcher and lecturer for cyber security and IT
forensics and has been working at Albstadt-Sigmaringen University for more than 10 years. There
he is active at the Institut für Wissenschaftliche Weiterbildung (IWW) in the in-service
certificate program and teaches in special online modules. He also gives lectures and conducts
workshops. Tobias authored the book Hardware & Security, also published by Rheinwerk Verlag.
In this book, he wrote the chapter on IT forensics.Wübbeling Matthias :
Matthias Wübbeling is an IT security enthusiast, scientist, author, entrepreneur, consultant, and speaker. As an academic councilor at the University of Bonn and researcher at Fraunhofer FKIE, he researches and teaches in the areas of network security, IT security awareness, and identity theft. With the University of Bonn spin-off Identeco, he provides stolen identity data to protect employee and customer accounts against payment defaults due to identity fraud. In this book, Matthias describes the use of Snort for intrusion detection.

