It looks like you're offline.
Open Library logo
additional options menu
Last edited by Mojo
September 10, 2011 | History

Eric Cole

Network security expert

21 works Add another?

Sorting by Sorted by: Most Editions | First Published | Most Recent | Top Rated | Reading Log | Random

Showing all works by author. Would you like to see only ebooks?

  • Cover of: Network Security Bible
    First published in 2004 7 editions in 1 language — 1 previewable

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So Far

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: SANS GIAC Certification: Security Essentials Toolkit (GSEC)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Hiding in Plain Sight: Steganography and the Art of Covert Communication

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Wiley Pathways Network Security Fundamentals Project Manual (Wiley Pathways)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Hackers Beware: The Ultimate Guide to Network Security

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Wiley Pathways Network Security Fundamentals with Project Manual Set

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Network Security (Strayer University Custom Edition)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Wiley Pathways Network Security Fundamentals

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Wiley Pathways Network Security Fundamentals Project Manual

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Network security fundamentals
    First published in 2008 1 edition in 1 language — 1 previewable

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Hiding in Plain Sight: Steganography and the Art of Covert Communication

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Network Security Bible
    First published in 2005 1 edition in 1 language — 1 previewable

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today

History

Download catalog record: RDF / JSON
September 10, 2011 Edited by Mojo Homepage
August 27, 2010 Edited by Conleth merge authors
September 6, 2008 Edited by RenameBot fix author name
April 1, 2008 Created by an anonymous user initial import