About the Author
Fernando Maymï¿ (West Point, NY) , Ph.D., CISSP is a security practitioner with over 25 years experience in the field. He is currently the Deputy Director at the Army Cyber Institute at West Point, where he leads a multidisciplinary team charged with developing disruptive innovations for cyberspace operations as well as impactful public-private partnerships aimed at better securing cyberspace. Dr. Maymï¿ has served as a consultant for both government and private sector organizations in the US and abroad. He has authored and taught dozens of courses and workshops in cyber security for academic, government, and professional audiences in the United States and Latin America. Dr. Maymï¿ is the author of over a dozen publications and holds three patents. His awards include the U.S. Department of the Army Research and Development Achievement Award and he was recognized as a HENAAC Luminary. He worked closely with Shon Harris for the last two years of her life, advising her on a multitude of projects, including the previous version of this book. Dr. Maymï¿ is also a volunteer puppy raiser for Guiding Eyes for the Blind and has raised two guide dogs, Trinket and Virgo.
Jonathan Ham, CISSP, GSEC, GCIA, GCIH, is an independent consultant who specializes in large-scale enterprise security issues, from policy and procedure, through staffing and training, to scalable prevention, detection, and response technology and techniques. With a keen understanding of ROI and TCO, he has helped his clients achieve greater success for more than 12 years, advising in both the public and private sectors, from small upstarts to the Fortune 500. Jonathan has been commissioned to teach NCIS investigators how to use Snort, performed packet analysis from a facility more than 2000 feet underground, and chartered and trained the CIRT for one of the largest U.S. civilian federal agencies. He is a member of the GIAC Advisory Board and is a SANS instructor teaching their MGT414: SANS Training Program for CISSP Certification course. He is also co-author of Network Forensics: Tracking Hackers through Cyberspace, a textbook published by Prentice-Hall.