During the 21st Colloquium, we will be spotlighting our authors with a display table of books! To participate, please donate an autographed book, to be raffled on the last day of the conference. You are welcome to include discount coupons for members to consider using your book in classes across the country. CISSE will spotlight our authors during the cocktail party on Monday night; please note that you must be a registered attendee to be included in this promotion.

Summary of books, graciously donated by our membership


The Complete Guide to Cybersecurity Risks and Controls

Anne Kohnke, Dan Shoemaker, Ken E. Sigler

Super Cybersecurity Grandma

Episode 1 - Phishing and Ransomware

Dr. Lmb Pailen

Super Cybersecurity Grandma

Episode 2 - Cyber Bullying

Dr. Lmb Pailen

Super Cybersecurity Grandma

Episode 3 - Internet of Things

Dr. Lmb Pailen

Certified | Network Defender

Volume 1: Network Security Essentials

EC-Council Academia

Certified | Network Defender

Volume 2: Network Security Policy Design and Implementation

EC-Council Academia

Certified | Network Defender

Volume 3: Network Monitoring Analysis and Wireless Security

EC-Council Academia

Certified | Network Defender

Volume 4: Network Data Backup and Incident Response

EC-Council Academia

Certified | Ethical Hacker

Volume 1: Ethical Hacking Concepts and Methodology

EC-Council Academia

Certified | Ethical Hacker

Volume 2: Attack Vectors and Countermeasures

EC-Council Academia

Certified | Ethical Hacker

Volume 3: Web Attacks and Defense

EC-Council Academia

Certified | Ethical Hacker

Volume 4: Security Controls and Assessment

EC-Council Academia

Computer | Hacking Forensic Investigator

Volume 1: Computer Forensics Investigation Methodology

EC-Council Academia

Computer | Hacking Forensic Investigator

Volume 2: Operating System Forensics Techniques

EC-Council Academia

Computer | Hacking Forensic Investigator

Volume 3: Network Intrusion and Cybercrime Forensics

EC-Council Academia

Computer | Hacking Forensic Investigator

Volume 4: Malware, Email, and Mobile Forensics

EC-Council Academia