Jump to content

Chuck Easttom: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
No edit summary
Line 19: Line 19:
----
----


'''William Chuck Easttom II''' is a computer scientist, author, inventor, and educator.<ref>{{Cite web|url=http://www.chuckeasttom.com|title=Chuck Easttom's website|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>. He has been named a Distinguished Speaker of the ACM, <ref>{{Cite web|url=https://speakers.acm.org/speakers/easttom_8543|title=ACM Distinguised Speaker|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>. He is a reviewer for multiple scientific journals including the IEEE Journal of Security and Privacy<ref>{{Cite web|url=https://www.computer.org/csdl/mags/sp/2018/01/msp2018010003.html|title=IEEE Reviewer Thanks|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>.. He has authored 26 books<ref>{{Cite web|http://www.technosecurity.us/tx/speakers/chuck-easttom|title=Speaker Bio |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref> on computer security, programming languages, linux, cyber forensics, penetration testing, and cryptography. His books are used as textbooks for both undergraduate and graduate programs at over 60 universities<ref>{{Cite web|url=https://www.liberty.edu/online/wp-content/uploads/CSCI511_CourseGuide.pdf| title=CS 511 digital forensics.| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://pages.southwesterncc.edu/kirks/bookorder.htm| title=CCT 121 Computer Crime Investigation.| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://www.tamuct.edu/syllabi/docs/2017_Fall/20170880042.pdf| title=CIS 4345, CRN 80042, Network and Systems Security| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://www.cs.fsu.edu/~langley/CIS4385-2018-1/Syllabus.html| title=CIS 4385 Cybercrime Detection and Digital Forensics| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://cfrs.gmu.edu/assets/Summer15/TCOM-CFRS-661-001-Summer2015-Syllabus-v1.pdf| title=TCOM/CFRS 661 Digital Media Forensics| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://cse.sc.edu/~farkas/csce201-2015/csce201-syllabus.htm| title=CSCE 201 Introduction to Computer Security| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://ksuweb.kennesaw.edu/~ashaw8/acst3530-01-Summer16/acst3530s1syllabus.html| title=ACST 3530 - Linux Operating Systems and Networking| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://www.personal.kent.edu/~jbolen/comt36330/comt_36330.htm|title=COMT 36330 LAN Security Fundamentals|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://www.citadel.edu/root/mathcs-courses/descriptions/undergraduate-computerscience/58-academics/schools/ssm/mathematics-and-computer-science/22597-csci-227-cybersecurity-non-cs|title=CSCI: Principles and Practices of Cybersecurity |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://www.apus.edu/z/course-syllabus/ISSC630.pdf|title=ISSC630: Advanced Cybercrime Analysis |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://itech.fgcu.edu/faculty/zalewski/CNT4104/CNT4104-3.html|title=CNT 4104 Software Project in Computer Networks |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>
'''William Chuck Easttom II''' is a computer scientist, author, inventor, and educator.<ref>{{Cite web|url=http://www.chuckeasttom.com|title=Chuck Easttom's website|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>. He has been named a Distinguished Speaker of the ACM, <ref>{{Cite web|url=https://speakers.acm.org/speakers/easttom_8543|title=ACM Distinguised Speaker|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>. He is a reviewer for multiple scientific journals including the IEEE Journal of Security and Privacy<ref>{{Cite web|url=https://www.computer.org/csdl/mags/sp/2018/01/msp2018010003.html|title=IEEE Reviewer Thanks|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>. He has authored 26 books<ref>{{Cite web|url=http://www.technosecurity.us/tx/speakers/chuck-easttom|title=Speaker Bio |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref> on computer security, programming languages, linux, cyber forensics, penetration testing, and cryptography. His books are used as textbooks for both undergraduate and graduate programs at over 60 universities<ref>{{Cite web|url=https://www.liberty.edu/online/wp-content/uploads/CSCI511_CourseGuide.pdf| title=CS 511 digital forensics.| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://pages.southwesterncc.edu/kirks/bookorder.htm| title=CCT 121 Computer Crime Investigation.| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://www.tamuct.edu/syllabi/docs/2017_Fall/20170880042.pdf| title=CIS 4345, CRN 80042, Network and Systems Security| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://www.cs.fsu.edu/~langley/CIS4385-2018-1/Syllabus.html| title=CIS 4385 Cybercrime Detection and Digital Forensics| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://cfrs.gmu.edu/assets/Summer15/TCOM-CFRS-661-001-Summer2015-Syllabus-v1.pdf| title=TCOM/CFRS 661 Digital Media Forensics| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://cse.sc.edu/~farkas/csce201-2015/csce201-syllabus.htm| title=CSCE 201 Introduction to Computer Security| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://ksuweb.kennesaw.edu/~ashaw8/acst3530-01-Summer16/acst3530s1syllabus.html| title=ACST 3530 - Linux Operating Systems and Networking| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://www.personal.kent.edu/~jbolen/comt36330/comt_36330.htm|title=COMT 36330 LAN Security Fundamentals|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://www.citadel.edu/root/mathcs-courses/descriptions/undergraduate-computerscience/58-academics/schools/ssm/mathematics-and-computer-science/22597-csci-227-cybersecurity-non-cs|title=CSCI: Principles and Practices of Cybersecurity |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://www.apus.edu/z/course-syllabus/ISSC630.pdf|title=ISSC630: Advanced Cybercrime Analysis |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://itech.fgcu.edu/faculty/zalewski/CNT4104/CNT4104-3.html|title=CNT 4104 Software Project in Computer Networks |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>


He is a frequent speaker at cyber security conferences including: DEFCON 24 <ref>{{Cite web|url=https://www.defcon.org/html/defcon-24/dc-24-workshops.html |title=The Ins and Outs of Steganography|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>, DEFCON 25 <ref>{{Cite web|url=https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20workshops/DEFCON-25-Workshop-Chuck-Easttom-Windows-The-Undiscovered-Country-UPDATED.pdf |title=Windows the Undiscovered Country|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>
He is a frequent speaker at cyber security conferences including: DEFCON 24 <ref>{{Cite web|url=https://www.defcon.org/html/defcon-24/dc-24-workshops.html |title=The Ins and Outs of Steganography|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>, DEFCON 25 <ref>{{Cite web|url=https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20workshops/DEFCON-25-Workshop-Chuck-Easttom-Windows-The-Undiscovered-Country-UPDATED.pdf |title=Windows the Undiscovered Country|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>
Line 25: Line 25:
<ref>{{Cite web|url=https://events.secureworldexpo.com/speakers/page/2/|title= Secure World|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://events.secureworldexpo.com/agenda/dallas-tx-2017//|title= Secure World 2017|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>, and Princess Sumuya University in Jordan <ref>{{Cite web|url=https://www.youtube.com/watch?v=zG_tJmSxT-s&t=1460s |title=Utilizing Graph Theory to analyze Digital Forensics|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>.,
<ref>{{Cite web|url=https://events.secureworldexpo.com/speakers/page/2/|title= Secure World|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://events.secureworldexpo.com/agenda/dallas-tx-2017//|title= Secure World 2017|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>, and Princess Sumuya University in Jordan <ref>{{Cite web|url=https://www.youtube.com/watch?v=zG_tJmSxT-s&t=1460s |title=Utilizing Graph Theory to analyze Digital Forensics|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>.,


He has been interviewed regarding cyber security topics by CNN Money <ref>{{Cite web|url=http://money.cnn.com/2011/09/02/technology/unhackable_code/|title=Unhackable Code| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref> and CBS Smart Planet <ref>{{Cite web|url=http://www.smartplanet.com/blog/bulletin/nsa-proof-products-protective-or-a-profit-motive/| title=NSA proof products: protective or a profit motive?| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>, and other media outlets <ref>{{Cite web|url=http://www.bankinfosecurity.com/interviews/what-jpmorgan-chase-breach-teaches-us-i-2982| title=What the JPMorgan Chase Breach Teaches Us| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://www2.ljworld.com/news/2006/aug/06/hackers_infiltrate_web_site/| title=Hackers infiltrate Web site| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://www.forensicfocus.com/News/article/sid=2902/| title=Interview With Chuck Easttom, Computer Scientist & Consultant| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://www.bankinfosecurity.com/executives-must-use-discretion-on-social-media-a-8777| title=Steps Executives Can Take to Fight Fraud| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://www.cryptomathic.com/news-events/blog/author/chuck-easttom-guest8|title=Generating Cryptographic Keys: Will Your Random Number Generators (PRNGs) Do The Job?|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|http://usmcoc.org/wp-content/uploads/2016/07/2016-Summit-Bios-Final.pdf|title=Speaker Bio |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|https://www.forensicfocus.com/c/mode=prnt/id=189/interviews/2017/chuck-easttom-computer-scientist-amp-consultant/|title=Forensic Focus |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>.
He has been interviewed regarding cyber security topics by CNN Money <ref>{{Cite web|url=http://money.cnn.com/2011/09/02/technology/unhackable_code/|title=Unhackable Code| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref> and CBS Smart Planet <ref>{{Cite web|url=http://www.smartplanet.com/blog/bulletin/nsa-proof-products-protective-or-a-profit-motive/| title=NSA proof products: protective or a profit motive?| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>, and other media outlets <ref>{{Cite web|url=http://www.bankinfosecurity.com/interviews/what-jpmorgan-chase-breach-teaches-us-i-2982| title=What the JPMorgan Chase Breach Teaches Us| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://www2.ljworld.com/news/2006/aug/06/hackers_infiltrate_web_site/| title=Hackers infiltrate Web site| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://www.forensicfocus.com/News/article/sid=2902/| title=Interview With Chuck Easttom, Computer Scientist & Consultant| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://www.bankinfosecurity.com/executives-must-use-discretion-on-social-media-a-8777| title=Steps Executives Can Take to Fight Fraud| last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://www.cryptomathic.com/news-events/blog/author/chuck-easttom-guest8|title=Generating Cryptographic Keys: Will Your Random Number Generators (PRNGs) Do The Job?|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://usmcoc.org/wp-content/uploads/2016/07/2016-Summit-Bios-Final.pdf|title=Speaker Bio |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://www.forensicfocus.com/c/mode=prnt/id=189/interviews/2017/chuck-easttom-computer-scientist-amp-consultant/|title=Forensic Focus |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>.


He provides digital forensics training to state, local, and federal law enforcement. His computer security and forensics courses are approved by the U.S. Department of Homeland Security - National Initiative For Cyber Security Careers and Studies (NICCS). He created the OSFCE (OSForensics Certified Examiner) course and test <ref>{{Cite web|url=https://www.osforensics.com/training.html |title=OSForensics Training|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>
He provides digital forensics training to state, local, and federal law enforcement. His computer security and forensics courses are approved by the U.S. Department of Homeland Security - National Initiative For Cyber Security Careers and Studies (NICCS). He created the OSFCE (OSForensics Certified Examiner) course and test <ref>{{Cite web|url=https://www.osforensics.com/training.html |title=OSForensics Training|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>
Line 34: Line 34:


== Education ==
== Education ==
He holds a B.A. in Communications from Southeastern Oklahoma State University, a M.Ed. from Southeastern Oklahoma State University, a masters degree in Applied Computer Science from Northcentral University,and a Masters in Systems Engineering from the University of Texas at El Paso, as well as a Doctor of Science in cyber security from Capitol Technology University <ref>{{Cite web|url=https://events.secureworldexpo.com/speakers/chuck-easttom/|title=Chuck Easttom Bio |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://saiconference.com/FICC2019/Speakers|title=Chuck Easttom Bio |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|https://www.captechu.edu/blog/easttom-cyber-war-malware-weapon-of-choice|title=Easttom: in cyber war, malware is “the weapon of choice” |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>.
He holds a B.A. in Communications from Southeastern Oklahoma State University, a M.Ed. from Southeastern Oklahoma State University, a masters degree in Applied Computer Science from Northcentral University,and a Masters in Systems Engineering from the University of Texas at El Paso, as well as a Doctor of Science in cyber security from Capitol Technology University <ref>{{Cite web|url=https://events.secureworldexpo.com/speakers/chuck-easttom/|title=Chuck Easttom Bio |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=http://saiconference.com/FICC2019/Speakers|title=Chuck Easttom Bio |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{Cite web|url=https://www.captechu.edu/blog/easttom-cyber-war-malware-weapon-of-choice|title=Easttom: in cyber war, malware is “the weapon of choice” |last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref>.


== List of Books ==
== List of Books ==

Revision as of 10:01, 12 November 2018

  • Comment: This appears to be a promotional autobiography. Wikipedia is not a resume hosting service. Please review WP:COI. K.e.coffman (talk) 03:12, 22 October 2018 (UTC)


  • Comment: OK I have reviewed and cleaned up. For starters, I removed the certification section (I don't think industry certifications make one notable). Then I looked for whether or not the subject is notable. I found he was a Distinguished speaker of the ACM. According to Wikipedia's ACM article there are only 125 current distinguished speakers. I would think being one makes one notable. https://en.wikipedia.org/wiki/Association_for_Computing_Machinery#Distinguished_Speakers. I have found numerous references to this subject. In fact 8 different wikipedia articles on various topics, reference him. I disagree this is promotional though. I did not see any puffery. NO comments like "leading expert", "world renowned", "best", etc. It seems just a neutral listing of the subjects accomplishments. everything seems verified by third party trusted sources. There is no puffery language in this article (and was not in the first place). All the sources are from reliable third parties (about 40 such citations), none from the subject of the article. Now the question is this person notable enough for wikipedia? In my opinion being a Distinguished speaker of the ACM seems sufficient. Others may disagree. If that is not sufficient, then the 8 citations in Wikipedia itself should be sufficient. But there are also documented interviews from CNN and CBS, 15 patents, 26 books (not self published, but real publishers), and numerous external citations. From what I can find on Google, this guy speaks at pretty much every major cyber security conference there is. Is this not at least minor notability? I have made quite a few changes, but that is all the time I can spend on this. It is up to the rest of you to decide) I decided to check What Wikipedia's standards are for academic/scientific notability
   1. The person's research has had a significant impact in their scholarly discipline, broadly construed, as demonstrated by independent reliable sources.

OK this subjects books are used at numerous universities, work published in major journals, speaking at major conferences, confirmed by over 60 independent sources.

   2. The person has received a highly prestigious academic award or honor at a national or international level.

Distinguished Speaker of the ACM

4. The person's academic work has made a significant impact in the area of higher education, affecting a substantial number of academic institutions.

Many universities using the subjects textbooks, including for graduate programs. He is also a reviewer for major journals like an IEEE journal. The subject appears to qualify under three different criterial


William Chuck Easttom II is a computer scientist, author, inventor, and educator.[1]. He has been named a Distinguished Speaker of the ACM, [2]. He is a reviewer for multiple scientific journals including the IEEE Journal of Security and Privacy[3]. He has authored 26 books[4] on computer security, programming languages, linux, cyber forensics, penetration testing, and cryptography. His books are used as textbooks for both undergraduate and graduate programs at over 60 universities[5][6][7][8][9][10][11][12][13][14][15]

He is a frequent speaker at cyber security conferences including: DEFCON 24 [16], DEFCON 25 [17] , AAFS conference 2017, IAFLS Conference 2017 in Cairo, Secure Jordan 2016 and 2017, ADFSL Conference 2016 [18] , and ISC2 Security Congress 2014, 2015, 2017 [19], 2018 [20], University of Texas at Dallas [21],Secure World [22][23], and Princess Sumuya University in Jordan [24].,

He has been interviewed regarding cyber security topics by CNN Money [25] and CBS Smart Planet [26], and other media outlets [27][28][29][30][31][32][33].

He provides digital forensics training to state, local, and federal law enforcement. His computer security and forensics courses are approved by the U.S. Department of Homeland Security - National Initiative For Cyber Security Careers and Studies (NICCS). He created the OSFCE (OSForensics Certified Examiner) course and test [34] , the EC Council Certified Encryption Specialist course and certification test [35], and EC Council CAST Advanced Encryption course [36] .


Education

He holds a B.A. in Communications from Southeastern Oklahoma State University, a M.Ed. from Southeastern Oklahoma State University, a masters degree in Applied Computer Science from Northcentral University,and a Masters in Systems Engineering from the University of Texas at El Paso, as well as a Doctor of Science in cyber security from Capitol Technology University [37][38][39].

List of Books

Chuck Easttom is the author of 26 computer science books. These include:

  • Essential Linux Administration: A Comprehensive Guide for Beginners. Cengage Press (2011)
  • System Forensics, Investigation, and Response. Jones & Bartlett (2013)
  • Certified Cyber Forensics Professional All in One Guide. McGraw-Hill (2014)
  • Computer Security Fundamentals (3rd Edition). Pearson IT Cybersecurity Curriculum (ITCC)) (2016)
  • System Forensics, Investigation, and Response (Information Systems Security & Assurance) 3rd Edition. Jones and Bartlett (2017)
  • CompTIA Security+ Study Guide: Exam SY0-501. John Wiley & Sons (2017)
  • Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits (1st Edition). Pearson IT Cybersecurity Curriculum (2018)
  • CompTIA Security+ Practice Tests: Exam SY0-501. Sybex (2018)
  • Network Defense and Countermeasures: Principles and Practices (3rd Edition). Pearson IT Cybersecurity Curriculum (ITCC)) (2018)
  • Networking Fundamentals, 3rd Edition. Goodheart-Wilcox Publishing) (2018)
  • JBuilder 7.0 EJB Programming.WordWare Publishing (2002)
  • Programming Fundamentals in C++.Charles River Learning. 1st Edition, Charles River Media (2003)
  • Beginning JavaScript, 1st Edition.WordWare Publishing (2001)

Articles

The following are a sample of Chuck Easttom's published research papers

Easttom, C. (2019). " Conducting Investigations on the Dark Web". Journal of Information Warfare 18 (1).

Easttom, C. (2018, March). The Role of Weaponized Malware in Cyber Conflict and Espionage. In ICCWS 2018 13th International Conference on Cyber Warfare and Security (p. 191).[40].

Easttom, C. (2018). An Examination of Inefficiencies in Key Dependent Variations of the Rijndael S-Box. In Electrical Engineering (ICEE), Iranian Conference on (pp. 1658-1663). IEEE[41].

Easttom, C. (2018). A Generalized Methodology for Designing Non-Linear Elements in Symmetric Cryptographic Primitives. In Computing and Communication Workshop and Conference (CCWC), 2018 IEEE 8th Annual[42] .

Easttom, C. (2018, May). An Examination of Inefficiencies in Key Dependent Variations of the Rijndael S-Box. In Electrical Engineering (ICEE), Iranian Conference on (pp. 1658-1663). IEEE.[43].

Easttom, C. (2018). Bluetooth Hacking 101. 2600 Magazine 35(1). [44].

Easttom, C. (2016). Spyware Techniques. 2600 Magazine. 33(3)[45].

Easttom, C. (2017). Enhancing SQL Injection With Stored Procedures. 2600 Magazine. 34(3). [46]

Easttom, C. (2018) An Overview of Cryptographic Backdoors. Journal of Information System Security, 13 (3), 177-185.

Easttom, C. (2018). A Method For Using Historical GPS Phone Records. Digital Forensics Magazine, 36.

Easttom, C. (2018). The Daubert Standard as a Framework for Digital Forensics. Digital Forensics Magazine, 35.

Easttom, C. (2018). How to model digital forensics investigations with graph theory. Digital Forensics Magazine, 37.

Easttom, C. (2017).  The RSA Algorithm Explored. International Journal of Innovative Research in Information Security. (IJIRIS). 4(1)[47]

Presentation on "Quantum Computing and Lattice Based Cryptography" April 11, 2018 University of Texas at Dallas ACM chapter as part of the Distinguished Speakers of the ACM program.

Easttom, C. (2018). How to model digital forensics investigations with graph theory. Digital Forensics Magazine, 37.

Easttom, C. (2018). "A Systems Approach To Indicators Of Compromise Utilizing Graph Theory". 2018 IEEE International Symposium on Technologies for Homeland Security.

Easttom (2018). An Examination of the Operational Requirements of Weaponized Malware. Journal of Information Warfare 17 (2) [48].

Patents

Method and apparatus of performing distributed steganography of a data message. U.S. Patent 8,527,779[49]

Method and apparatus of performing data executable integrity verification. U.S. Patent No. 8,984,639[50]

Method and apparatus of performing data executable integrity verification. U.S. Patent No. 9,405,907[51]

Method and apparatus providing a multiple source evidence application trust model. US Patent 9,984,229[52]

Stable File System. U.S. Patent No. 8,713,067[53]

Method and apparatus of performing data executable integrity verification. U.S. Patent No. US 8,819,827 B1[54]

Managing a network element operating on a network. US Patent No.8,825,845 B1[55]

Domain name service based remote programming objects. US Patent No.8,825,810 B1[56]

Domain name service based remote programming objects. US Patent No.9,313,167 B1[57]

Method and apparatus of performing distributed steganography of a data message US Patent No. 9,619,656 [58]

Domain Name Service based remote programming objects. US Patent No. 9,686,227 US 9313167B1, "Domain name service based remote programming objects", issued 2014-09-02 </ref>

Managing a network element operating on a network US Patent No. 9,755,887B1 [59]

Method and apparatus of performing data executable integrity verification US Patent No. 9,754,108[60]

System and method for document tracking US Patent No. 9,753,957[61]

Managing a network element operating on a network US Patent No. 9,984,229 [62]

References

  1. ^ "Chuck Easttom's website". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  2. ^ "ACM Distinguised Speaker". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  3. ^ "IEEE Reviewer Thanks". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  4. ^ "Speaker Bio". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  5. ^ "CS 511 digital forensics" (PDF). {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  6. ^ "CCT 121 Computer Crime Investigation". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  7. ^ "CIS 4345, CRN 80042, Network and Systems Security" (PDF). {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  8. ^ "CIS 4385 Cybercrime Detection and Digital Forensics". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  9. ^ "TCOM/CFRS 661 Digital Media Forensics" (PDF). {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  10. ^ "CSCE 201 Introduction to Computer Security". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  11. ^ "ACST 3530 - Linux Operating Systems and Networking". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  12. ^ "COMT 36330 LAN Security Fundamentals". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  13. ^ "CSCI: Principles and Practices of Cybersecurity". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  14. ^ "ISSC630: Advanced Cybercrime Analysis" (PDF). {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  15. ^ "CNT 4104 Software Project in Computer Networks". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  16. ^ "The Ins and Outs of Steganography". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  17. ^ "Windows the Undiscovered Country" (PDF). {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  18. ^ "ADFSL 2016". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  19. ^ "Applying Graph Theory to Digital Investigations". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  20. ^ "Exploration of Quantum Computing and Post-Quantum Cryptographylast=". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  21. ^ "Overview of Quantum Computing". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  22. ^ "Secure World". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  23. ^ "Secure World 2017". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  24. ^ "Utilizing Graph Theory to analyze Digital Forensics". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  25. ^ "Unhackable Code". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  26. ^ "NSA proof products: protective or a profit motive?". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  27. ^ "What the JPMorgan Chase Breach Teaches Us". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  28. ^ "Hackers infiltrate Web site". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  29. ^ "Interview With Chuck Easttom, Computer Scientist & Consultant". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  30. ^ "Steps Executives Can Take to Fight Fraud". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  31. ^ "Generating Cryptographic Keys: Will Your Random Number Generators (PRNGs) Do The Job?". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  32. ^ "Speaker Bio" (PDF). {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  33. ^ "Forensic Focus". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  34. ^ "OSForensics Training". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  35. ^ "ECES". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  36. ^ "Author Bio". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  37. ^ "Chuck Easttom Bio". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  38. ^ "Chuck Easttom Bio". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  39. ^ "Easttom: in cyber war, malware is "the weapon of choice"". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  40. ^ "The Role of Weaponized Malware in Cyber Conflict and Espionag". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  41. ^ "An Examination of Inefficiencies in Key Dependent Variations of the Rijndael S-Box". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  42. ^ "A Generalized Methodology for Designing Non-Linear Elements in Symmetric Cryptographic Primitives". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  43. ^ "An Examination of Inefficiencies in Key Dependent Variations of the Rijndael S-Box". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  44. ^ "Bluetooth Hacking 101". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  45. ^ "Spyware Techniques". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  46. ^ "Enhancing SQL Injection With Stored Procedure". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  47. ^ "The RSA Algorithm Explored" (PDF). {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  48. ^ "An Examination of the Operational Requirements of Weaponized Malware". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  49. ^ US 8527779B1, "Method and apparatus of performing distributed steganography of a data message", issued 2011-08-31 
  50. ^ US 8984639B1, "Method and apparatus of performing data executable integrity verification", issued 2014-08-13 
  51. ^ US 9405907B1, "Method and apparatus of performing data executable integrity verification", issued 2015-03-16 
  52. ^ US 9984229, Easttom, I. I., "Method and apparatus providing a multiple source evidence application trust model", issued May 29, 2018 
  53. ^ US 8713067B1, "Stable file system", issued 2011-07-08 
  54. ^ US 8819827B1, "Method and apparatus of performing data executable integrity verification", issued 2011-11-10 
  55. ^ US 8825845B1, "Managing a network element operating on a network", issued 2011-11-10 
  56. ^ US 8825810B1, "Domain name service based remote programming objects", issued 2011-07-11 
  57. ^ US 9313167B1, "Domain name service based remote programming objects", issued 2014-09-02 
  58. ^ US 9313167B1, "Method and apparatus of performing distributed steganography of a data message", issued 2017-04-11 
  59. ^ US 10,122,573, "Managing a network element operating on a network", issued 2017-09-05 
  60. ^ "US Patent 10,083,028 Method, apparatus and system for verifying code integrity on clients". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  61. ^ "US Patent 9,753,957 Method, System and method for document tracking". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  62. ^ US 10,122,573, "Managing a network element operating on a network", issued 2018-11-06