Books Shop

Our Collection

Dr. Cole is passionate about making cyberspace safe and sharing his knowledge with the world. One of the many ways he does this is with the books he writes. Many of his books are used as the authoritative source for cybersecurity and referenced in many courses and research material.

If you want to learn more about cybersecurity, books are a great place to start to get the core knowledge and expertise. However, there are also videos on Dr. Cole’s YouTube channel, LinkedIn and other social media pages. You also might want to consider attending one of Dr. Coles keynotes or Cyber911 Live events.

Online Danger

Cyberspace is an informative, fun, and educational place for the entire family, but danger lurks everywhere you turn online. From phishing to cyber bullying to identity theft, there are a myriad of ways that you and your loved ones could be harmed online, often with irreparable damage. Fortunately, there are precautions that everyone can take to protect themselves, their families, and their businesses that don’t require advanced (or even any) technical knowledge. In this book, cybersecurity expert, Dr. Eric Cole, provides a layman’s look at how to protect yourself online.

Dr. Cole makes the case that everyone is a potential target, not just the rich and famous. And we all have the ability to make it more difficult for cyber criminals to make us their next victim. He explains in plain language how to make your computer safer, protect your email, and guard your online accounts.

Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet applies to organizations as well as individuals, and across professions. Doctors, lawyers, and teachers – anyone responsible for safeguarding a client’s or student’s data – will learn something they can use right away.

Whether you are a parent wanting to know how to keep your children safe as they use the Internet, a senior citizen who doesn’t want to fall prey to an online scammer, or a daily technology user who wants to learn more about how to protect themselves in cyberspace, this book is for you.

Advanced Persistent Threat

One of the threats to security has been categorized as the Advanced Persistent Threat or APT or sometimes just called an advanced threat. The APT bypasses most of an organization’s current security devices and is typically carried out by an organized group, such as a foreign nation-state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Dr. Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim.

Advanced Persistent Threat was and still is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. As with many of Dr. Cole’s books, Advance Persistent Threat was the first book on this topic and quickly became one of the authoritative texts in the field. Many of the books that followed references and utilized many of the thought-provoking techniques and topics that were written and continue to show the thought leadership and contribution that Dr. Cole is making in the area of cybersecurity.

Network Security Bible Second Edition

One of the top authoritative, technical guides on cybersecurity that is a reference for many colleges and security training around the world. This book is a must for working network and security professionals, as well as anyone in IT/IS seeking to build competence in the increasingly important field of security. This was written by Dr. Eric Cole, who is an ex-CIA security guru who appears regularly on top media channels. Dr. Cole is one of the top authoritative sources on cybersecurity. This book covers everything from basic security principles and practices, to the latest security threats and responses, including proven methods for diagnosing network vulnerabilities and insider secrets for boosting security effectiveness.

This book is literally “the bible” when it comes to understanding and studying all of the core areas of security and the core principles needed to implement proper security within your organization. If it is a core area of security, it is covered in the Network Security Bible. The second edition includes updated information and details about emerging trends and core areas of focus needed for anyone working in cybersecurity or just interested about learning more about the topic.

Insider Threat

The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified “Insider Threats” as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems and supporting policies.

The book begins by identifying the types of insiders who are most likely to pose a threat. Next, the reader will learn about the variety of tools and attacks used by insiders to commit their crimes including: encryption, steganography, and social engineering. The book will then specifically address the dangers faced by corporations and government agencies. Finally, the reader will learn how to design effective security systems to prevent insider attacks and how to investigate insider security breaches that do occur. Throughout the book, the authors will use their backgrounds in the CIA to analyze several, high-profile cases involving insider threats.

Hiding In Plain Sight

This book explains exactly what steganography is: hiding a message inside an innocuous picture or music file. It explains how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys. First, the book describes international terrorists’ cybersecurity tool of choice in an clear and accessible language. The author is a top security consultant for the CIA and provides gripping stories that show how steganography works. This book will teach you everything you need to know about steganography and cryptography and the appendix provides tools to help people detect and counteract steganography.

Hackers Beware

Hackers Beware starts with a roadmap of the various areas of hacking, but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested “in how they do that” or the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them.

This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the everything you need to know. It will not only describe how an exploit works, but present the signature of the attack, what to look for on a network and how to protect against it.

Cyber Spying

Cyber Spying – Tracking Your Family’s (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book’s final section describes personal privacy and counter-spy techniques. By teaching by both theory and with practical examples, this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.

Testimonials

Are you ready to learn more about cybersecurity?