search for books and compare prices
Eric Cole has written 11 work(s)
Search for other authors with the same name
displaying 1 to 11 | at end
show results in order: alphabetically | oldest to newest | newest to oldest
Cover for 9781597499491 Cover for 9780764573972 Cover for 9780470221075 Cover for 9781597491228 Cover for 9780080558783 Cover for 9781597490481 Cover for 9780080489056 Cover for 9781897178041 Cover for 9781931836418 Cover for 9780080488653 Cover for 9780471444497 Cover for 9780789727749 Cover for 9780735710092
A guide to network security covers such topics as access controls, Windows security, UNIX and Linux security, HTTP, nework architecture fundamentals, cryptography, and intrusion detection.

Paperback:

9780764573972 | John Wiley & Sons Inc, January 31, 2005, cover price $39.99 | About this edition: A guide to network security covers such topics as access controls, Windows security, UNIX and Linux security, HTTP, nework architecture fundamentals, cryptography, and intrusion detection.

Miscellaneous:

9780470569993 | 2 edition (John Wiley & Sons Inc, September 18, 2009), cover price $59.99 | also contains Network Security Bible

Paperback:

9780470502495 | 2 edition (John Wiley & Sons Inc, September 8, 2009), cover price $59.99

Miscellaneous:

9780470569993 | 2 edition (John Wiley & Sons Inc, September 18, 2009), cover price $59.99 | also contains Network Security Bible

cover image for 9780080558783
Explaining how physical and logical security issues need to be addressed in tandem, a guide to enterprise security management (ESM) explains how to use ESM capabilities to provide security prevention, detection, and management functions, with guidelines on how to use the technology in such areas as fraud investigation, complex incident analysis, incident tracking, anomaly detection, and more. Original (Intermediate)
By Colby Derodeff (editor)

Paperback:

9781597491228 | Syngress Media Inc, April 13, 2007, cover price $66.95 | About this edition: Explaining how physical and logical security issues need to be addressed in tandem, a guide to enterprise security management (ESM) explains how to use ESM capabilities to provide security prevention, detection, and management functions, with guidelines on how to use the technology in such areas as fraud investigation, complex incident analysis, incident tracking, anomaly detection, and more.

Miscellaneous:

9780080558783 | Syngress Media Inc, May 1, 2007, cover price $59.95

cover image for 9781597490481

Paperback:

9781597490481 | Syngress Media Inc, March 1, 2006, cover price $38.95

Miscellaneous:

9780080489056 | Syngress Media Inc, March 1, 2006, cover price $34.95

cover image for 9781897178041
Product Description: For Irish-born poet and zookeeper Eric Cole, the fourteen lines and rhythmic patterns of the sonnet echo the very building blocks of life. Within the basic structure of simple genetic material lies the limitless potential for the existence of all living things, be they man or beast...read more

Paperback:

9781897178041 | Insomniac Pr, December 30, 2005, cover price $9.95 | About this edition: For Irish-born poet and zookeeper Eric Cole, the fourteen lines and rhythmic patterns of the sonnet echo the very building blocks of life.

cover image for 9781931836418
Presents tips and techniques for spying on computer users, covering such topics as computer networks, Web browsing, email, and instant messages.

Paperback:

9781931836418 | Syngress Media Inc, April 12, 2005, cover price $44.95 | About this edition: Presents tips and techniques for spying on computer users, covering such topics as computer networks, Web browsing, email, and instant messages.

Miscellaneous:

9780080488653, titled "Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives" | Syngress Media Inc, February 1, 2005, cover price $39.95

cover image for 9780471444497
Product Description: Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys First book to describe international terrorists' cybersecurity tool of choice in an accessible language Author is a top security consultant for the CIA and provides gripping stories that show how steganography works Appendix provides tools to help people detect and counteract stenanography...read more (view table of contents, read Amazon.com's description)

Paperback:

9780471444497 | Pap/cdr edition (John Wiley & Sons Inc, April 1, 2003), cover price $35.00 | About this edition: Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys First book to describe international terrorists' cybersecurity tool of choice in an accessible language Author is a top security consultant for the CIA and provides gripping stories that show how steganography works Appendix provides tools to help people detect and counteract stenanography

cover image for 9780789727749
Product Description: Master the tools of the network security trade with the official book from SANS Press! You need more than a hammer to build a house, and you need more than one tool to secure your network. Security Essentials Toolkit covers the critical tools that you need to secure your site, showing you why, when, and how to use them...read more (view table of contents, read Amazon.com's description)

Paperback:

9780789727749 | Pearson It Certification, March 1, 2002, cover price $54.99 | About this edition: Master the tools of the network security trade with the official book from SANS Press!

cover image for 9780735710092
Explains how and why hackers break into computers, steal information, and deny services to machines' legitimate users, and discusses strategies and tools used by hackers and how to defend against them. (view table of contents)

Paperback:

9780735710092 | Sams, August 1, 2001, cover price $45.00 | About this edition: Explains how and why hackers break into computers, steal information, and deny services to machines' legitimate users, and discusses strategies and tools used by hackers and how to defend against them.

displaying 1 to 11 | at end