Jones & Bartlett Learning Cybersecurity - Our Authors

Our Authors

Name: Credentials: Affiliation: Book(s):
Julie Anderson MS Rollins College Python Programming in Context; Java Illuminated
Barbara Bernal Kennesaw State University Essentials of Software Engineering
Richard Blum Linux Fundamentals
Mike Chapple PhD, CISSP University of Notre Dame Access Control and Identity Management; Cyberwarfare: Information Operations in a Connected World
Nell Dale BS, PhD University of Texas Computer Science Illuminated; Object-Oriented Data Structures Using Java; C++ Plus Data Structures; Programming and Problem Solving with Java; Programming and Problem Solving with C++: Comprehensive.
Jim Doherty BS, MBA Wireless and Mobile Device Security
Chuck Easttom DSc, CISSP, CASP, CEH Digital Forensics, Investigation, and Response; Security Policies and Implementation Issues
Darril Gibson (ISC)2 SSCP and CISSP, CompTIA Security+ and CASP, is the CEO of YCDA (short for You Can Do Anything) Managing Risk in Information Systems
Joanna Lyn Grama JD, CISSP, CIPT, CRISC Vantage Technology Consulting Group Legal and Privacy Issues in Information Security
Mike Harwood MCT, MCSE, A+, Network+, Server+, Linux+ Internet Security: How to Defend Against Attackers on the Web
Andy Igonor PhD Franklin University Managing Risk in Information Systems
Kris Jamsa MBA, PhD Introduction to Data Mining and Analytics; Cloud Computing; Introduction to Web Development Using HTML 5
Michael Jang RHCE, LPIC-2, UCP, Linux+, MCP Senior Staff Technical Writer, ForgeRock Security Strategies in Linux Platforms and Applications
Robert Johnson CISA, CGEIT, CISM, CISSP Security Policies and Implementation Issues
Orlando Karam MBA, PhD Kennesaw State University
David Kim BSEE, CCNA, CISSP, CSCI Principal Consultant for GRC As a Service, LLC & GRC Principal Consultant for GRCaaS Fundamentals of Information Systems Security; Fundamentals of Communications and Networking
Denise Kinsey PhD, CISSP, PMP University of Houston Network Security, Firewalls, and VPNs
John Lewis MS, PhD Virginia Tech Computer Science Illuminated
Ric Messier GCIH, GSEC, CEH, CISSP FireEye Security Strategies in Linux Platforms and Applications
Bradley N. Miller PhD Luther College Python Programming in Context
Sean-Philip Oriyano CISSP, CHFI, CEH, CEI, CNDA, SCNP, SCPI, MCT, MCSE, and MCIT Hacker Techniques, Tools, and Incident Handling
David L. Ranum PhD Luther College Python Programming in Context
Catherine M. Ricardo PhD Iona College Databases Illuminated
Michael G. Solomon Ph.D., CISSP, PMP, CISM, PenTen+ University of the Cumberlands Fundamentals of Information Systems Security; Hacker Techniques, Tools, and Incident Handling; Fundamentals of Communications and Networking; Security Strategies in Windows Platforms and Applications; Auditing IT Infrastructures for Compliance
David Seidl CISSP, GCIH, GPEN University of Notre Dame Cyberwarfare: Information Operations in a Connected World
Richard E. Smith PhD, CISSP University of St. Thomas Elementary Information Security
Richard A. Spinello MA, PhD Boston College Cyberethics: Morality and Law in Cyberspace
J. Michael Stewart CEH, CHFI, ECSA, CND, Sec+, Net+, CISSP, CISM, CFR Network Security, Firewalls, and VPNs
Frank Tsui PhD Kennesaw State University Essentials of Software Engineering; Managing Systems and IT Projects
Susan D. Urban PhD Arizona State University Databases Illuminated
Martin Weiss MBA, Security+, CISSP, MCSE: Security, and RSA CSE Symantec Auditing IT Infrastructures for Compliance
Michael Workman PhD Texas A&M University Information Security Management

Interested in a Live Demo? Contact Your Account Specialist Today!

Contact Us