Name: |
Credentials: |
Affiliation: |
Book(s): |
Julie Anderson |
MS |
Rollins College |
Python Programming in Context; Java Illuminated |
Barbara Bernal |
|
Kennesaw State University |
Essentials of Software Engineering |
Richard Blum |
|
|
Linux Fundamentals |
Mike Chapple |
PhD, CISSP |
University of Notre Dame |
Access Control and Identity Management; Cyberwarfare: Information Operations in a Connected World |
Nell Dale |
BS, PhD |
University of Texas |
Computer Science Illuminated; Object-Oriented Data Structures Using Java; C++ Plus Data Structures; Programming and Problem Solving with Java; Programming and Problem Solving with C++: Comprehensive. |
Jim Doherty |
BS, MBA |
|
Wireless and Mobile Device Security |
Chuck Easttom |
DSc, CISSP, CASP, CEH |
|
Digital Forensics, Investigation, and Response; Security Policies and Implementation Issues |
Darril Gibson |
(ISC)2 SSCP and CISSP, CompTIA Security+ and CASP, is the CEO of YCDA (short for You Can Do Anything) |
|
Managing Risk in Information Systems |
Joanna Lyn Grama |
JD, CISSP, CIPT, CRISC |
Vantage Technology Consulting Group |
Legal and Privacy Issues in Information Security |
Mike Harwood |
MCT, MCSE, A+, Network+, Server+, Linux+ |
|
Internet Security: How to Defend Against Attackers on the Web |
Andy Igonor |
PhD |
Franklin University |
Managing Risk in Information Systems |
Kris Jamsa |
MBA, PhD |
|
Introduction to Data Mining and Analytics; Cloud Computing; Introduction to Web Development Using HTML 5 |
Michael Jang |
RHCE, LPIC-2, UCP, Linux+, MCP |
Senior Staff Technical Writer, ForgeRock |
Security Strategies in Linux Platforms and Applications |
Robert Johnson |
CISA, CGEIT, CISM, CISSP |
|
Security Policies and Implementation Issues |
Orlando Karam |
MBA, PhD |
Kennesaw State University |
|
David Kim |
BSEE, CCNA, CISSP, CSCI |
Principal Consultant for GRC As a Service, LLC & GRC Principal Consultant for GRCaaS |
Fundamentals of Information Systems Security; Fundamentals of Communications and Networking |
Denise Kinsey |
PhD, CISSP, PMP |
University of Houston |
Network Security, Firewalls, and VPNs |
John Lewis |
MS, PhD |
Virginia Tech |
Computer Science Illuminated |
Ric Messier |
GCIH, GSEC, CEH, CISSP |
FireEye |
Security Strategies in Linux Platforms and Applications |
Bradley N. Miller |
PhD |
Luther College |
Python Programming in Context |
Sean-Philip Oriyano |
CISSP, CHFI, CEH, CEI, CNDA, SCNP, SCPI, MCT, MCSE, and MCIT |
|
Hacker Techniques, Tools, and Incident Handling |
David L. Ranum |
PhD |
Luther College |
Python Programming in Context |
Catherine M. Ricardo |
PhD |
Iona College |
Databases Illuminated |
Michael G. Solomon |
Ph.D., CISSP, PMP, CISM, PenTen+ |
University of the Cumberlands |
Fundamentals of Information Systems Security; Hacker Techniques, Tools, and Incident Handling; Fundamentals of Communications and Networking; Security Strategies in Windows Platforms and Applications; Auditing IT Infrastructures for Compliance |
David Seidl |
CISSP, GCIH, GPEN |
University of Notre Dame |
Cyberwarfare: Information Operations in a Connected World |
Richard E. Smith |
PhD, CISSP |
University of St. Thomas |
Elementary Information Security |
Richard A. Spinello |
MA, PhD |
Boston College |
Cyberethics: Morality and Law in Cyberspace |
J. Michael Stewart |
CEH, CHFI, ECSA, CND, Sec+, Net+, CISSP, CISM, CFR |
|
Network Security, Firewalls, and VPNs |
Frank Tsui |
PhD |
Kennesaw State University |
Essentials of Software Engineering; Managing Systems and IT Projects |
Susan D. Urban |
PhD |
Arizona State University |
Databases Illuminated |
Martin Weiss |
MBA, Security+, CISSP, MCSE: Security, and RSA CSE |
Symantec |
Auditing IT Infrastructures for Compliance |
Michael Workman |
PhD |
Texas A&M University |
Information Security Management |