Reader small image

You're reading from  Instant XenMobile MDM

Product typeBook
Published inSep 2013
PublisherPackt
ISBN-139781849696265
Edition1st Edition
Right arrow
Author (1)
Aamir Lakhani
Aamir Lakhani
author image
Aamir Lakhani

Aamir Lakhani is a leading cyber security architect, senior strategist, and researcher. He is responsible for providing IT security solutions to major commercial and federal enterprise organizations. Lakhani leads projects that implement security postures for Fortune 500 companies, government organizations, major healthcare providers, educational institutions, and financial and media organizations. Lakhani has designed offensive counter-defense measures, and has assisted organizations in defending themselves from active strike-back attacks perpetrated by underground cyber groups. Lakhani is considered an industry leader in support of detailed architectural engagements and projects on topics related to cyber defense, mobile application threats, malware, advanced persistent threat (APT) research, and Dark Security. Lakhani is the author and contributor of several books that include Web Penetration Testing with Kali Linux and XenMobile MDM, both by Packt Publishing, and he has appeared on National Public Radio as an expert on cyber security. Lakhani runs the blog DrChaos.com, which was ranked as a leading source for cyber security by FedTech Magazine. He has been named one of the top personalities to follow on social media, ranked highly as leader in his field, and he continues to dedicate his career to cyber security, research, and education.
Read more about Aamir Lakhani

Right arrow

About the Reviewers

Eran Kinsbruner is the director of product marketing at Perfecto Mobile, one of the leading mobile cloud and automation companies. Formerly CTO for mobile testing and Texas Instruments project manager at Matrix. He has been in testing since 1999 with experience that includes managing teams at Qulicke & Soffa, Sun Microsystems, General Electric, and NeuStar. The co-inventor of a test exclusion automated mechanism for mobile J2ME testing at Sun Microsystems, he has experience in the mobile testing world and constantly presents in large conferences around subjects such as Quest, StarEast, STP, and TestKit. You can find Eran on Facebook, Twitter @ek121268, LinkedIn, and his professional mobile testing blogs at ek121268.wordpress.com and blog.perfectomobile.com. He works for Perfecto Mobile which is one of the leading mobile cloud companies, offering, based on its platform (the MobileCloud™), a wide range of mobile products and enterprise solutions such as Mobile Manual, Automation, Performance, and Monitoring testing for real devices such as Smartphones and Tablets. The company also provides integrations to leading market tools for continuous integration (for example, Jenkins), testing, and more. It is HP's chosen mobile testing solution, and with a joint effort between the two companies, they developed the UFT Mobile solution. He has published many bylines and articles such as Electronic Design, ToolsJournal, and APM Digest.

Joseph Muniz is a solutions architect and security researcher. He started his career in software development and later managed networks as a contracted technical resource. He moved into consulting and found a passion for security while meeting with a variety of customers. He has been involved with the design and implementation of multiple projects, ranging from Fortune 500 corporations to large federal networks. He runs the http://TheSecurityBlogger.com website, a popular resource regarding security and product implementation. You can also find him speaking at live events, as well as involved with other publications. Recent events include him being a speaker for "Social Media Deception" at the 2013 ASIS International conference, speaker for "Making Bring Your Own Device (BYOD) Work" at the Government Solutions Forum, Washington DC, Author of Web Penetration Testing with Kali Linux, Packt Publishing, August 2013 and article on "Compromising Passwords" in PenTest Magazine - Backtrack Compendium, July 2013. In his spare time, he can be found behind turntables scratching classic vinyl or on the soccer pitch hacking away at the local club teams.

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Instant XenMobile MDM
Published in: Sep 2013Publisher: PacktISBN-13: 9781849696265
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Aamir Lakhani

Aamir Lakhani is a leading cyber security architect, senior strategist, and researcher. He is responsible for providing IT security solutions to major commercial and federal enterprise organizations. Lakhani leads projects that implement security postures for Fortune 500 companies, government organizations, major healthcare providers, educational institutions, and financial and media organizations. Lakhani has designed offensive counter-defense measures, and has assisted organizations in defending themselves from active strike-back attacks perpetrated by underground cyber groups. Lakhani is considered an industry leader in support of detailed architectural engagements and projects on topics related to cyber defense, mobile application threats, malware, advanced persistent threat (APT) research, and Dark Security. Lakhani is the author and contributor of several books that include Web Penetration Testing with Kali Linux and XenMobile MDM, both by Packt Publishing, and he has appeared on National Public Radio as an expert on cyber security. Lakhani runs the blog DrChaos.com, which was ranked as a leading source for cyber security by FedTech Magazine. He has been named one of the top personalities to follow on social media, ranked highly as leader in his field, and he continues to dedicate his career to cyber security, research, and education.
Read more about Aamir Lakhani