Dr. Cole is passionate about making cyberspace safe and sharing his knowledge with the world. One of the many ways he does this is with the books he writes. Many of his books are used as the authoritative source for cybersecurity and referenced in many courses and research material.
If you want to learn more about cybersecurity, books are a great place to start to get the core knowledge and expertise. However, there are also videos on Dr. Cole’s YouTube channel, LinkedIn and other social media pages. You also might want to consider attending one of Dr. Coles keynotes or Cyber911 Live events.
Cyberspace is an informative, fun, and educational place for the entire family, but danger lurks everywhere you turn online. From phishing to cyber bullying to identity theft, there are a myriad of ways that you and your loved ones could be harmed online, often with irreparable damage. Fortunately, there are precautions that everyone can take to protect themselves, their families, and their businesses that don’t require advanced (or even any) technical knowledge. In this book, cybersecurity expert, Dr. Eric Cole, provides a layman’s look at how to protect yourself online.
Dr. Cole makes the case that everyone is a potential target, not just the rich and famous. And we all have the ability to make it more difficult for cyber criminals to make us their next victim. He explains in plain language how to make your computer safer, protect your email, and guard your online accounts.
Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet applies to organizations as well as individuals, and across professions. Doctors, lawyers, and teachers – anyone responsible for safeguarding a client’s or student’s data – will learn something they can use right away.
Whether you are a parent wanting to know how to keep your children safe as they use the Internet, a senior citizen who doesn’t want to fall prey to an online scammer, or a daily technology user who wants to learn more about how to protect themselves in cyberspace, this book is for you.
Network Security Bible Second Edition
One of the top authoritative, technical guides on cybersecurity that is a reference for many colleges and security training around the world. This book is a must for working network and security professionals, as well as anyone in IT/IS seeking to build competence in the increasingly important field of security. This was written by Dr. Eric Cole, who is an ex-CIA security guru who appears regularly on top media channels. Dr. Cole is one of the top authoritative sources on cybersecurity. This book covers everything from basic security principles and practices, to the latest security threats and responses, including proven methods for diagnosing network vulnerabilities and insider secrets for boosting security effectiveness.
This book is literally “the bible” when it comes to understanding and studying all of the core areas of security and the core principles needed to implement proper security within your organization. If it is a core area of security, it is covered in the Network Security Bible. The second edition includes updated information and details about emerging trends and core areas of focus needed for anyone working in cybersecurity or just interested about learning more about the topic.
Hiding In Plain Sight
This book explains exactly what steganography is: hiding a message inside an innocuous picture or music file. It explains how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys. First, the book describes international terrorists’ cybersecurity tool of choice in an clear and accessible language. The author is a top security consultant for the CIA and provides gripping stories that show how steganography works. This book will teach you everything you need to know about steganography and cryptography and the appendix provides tools to help people detect and counteract steganography.
Cyber Spying – Tracking Your Family’s (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book’s final section describes personal privacy and counter-spy techniques. By teaching by both theory and with practical examples, this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.