Computer Graphics Design Books
Adult Learning a Design for Action
Author: Budd Hall, Roby Kidd
School: University of Ibadan
Department: Education
Course Code: ADE202
Topics: Adult Learning, adult education
How to Design and Evaluate Research in Education, 8th Edition
Author: Jack Fraenkel, Norman Wallen, Helen Hyun
School: University of Ibadan
Department: Arts and Humanities
Course Code: ENG308
Topics: research, research problem, Sampling, ethics, instrrumentation, validity, reliability, Internal Validity, Internal Validity, inferential statistics, data analysis, educational research, Quantitative Research Methodologies, Experimental Research, Single-Subject Research, Correlational Research, Causal-Comparative Research, Survey Research, Qualitative Research, Observation, Interviewing, Content Analysis, Qualitative Research Methodologies, Ethnographic Research, Historical Research, Mixed-Methods Studies, Mixed-Methods Research, Writing Research Proposals, Writing Research Reports
Concept, Design and Feasibility 1
Author: DA Ayano
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: TSM342
Topics: Simple Cash Flow Forecasts, business plan, Feasibility Studies, Feasibility Report, Project Financing, project cycle, Project Planning, project Control, Cash flow statements, working capital management, Financial cost, benefits analysis, Breakeven analysis, Budgeting Techniques
Introduction to information theory and applications
Author: CODeL
School: Federal University of Technology, Minna
Department: Science and Technology
Course Code: CIT111, CPT111
Topics: von neuman, data, information, information processing, generations of computer, classifications of computer, number system, computer language, database, communication system, transmission impairment, analog signal, digital signal, Signal Modulation, Signal to Noise Ratio, data encoding, data decoding, transmission media, communication technique, computer network, internet
Advanced engineering control systems
Author: Roland burns
School: Federal University of Technology, Owerri
Department: Engineering
Course Code: EEE307
Topics: System modelling, Time domain analysis, Closed - loop control systems, classical design in the S-plane, Classical design in the Frequency domain, Digital control system design, classical design
Author: Steven Thompson
School: University of Ibadan
Department: Science and Technology
Course Code: STA351
Topics: Sampling, Sampling Units, Sampling errors, Nonsampling Errors, Simple Random Sampling, Confidence Intervals, Sample Size, Estimating Proportions, Estimating Ratios, Estimating Subpopulation Means, Unequal Probability Sampling, Horvitz-Thompson Estimator, Hansen–Hurwitz Estimator, Auxiliary Data, Ratio Estimation, Ratio Estimator, Small Population Illustrating Bias, Regression Estimation, Linear Regression Estimator, regression model, Multiple Regression Models, Regression Models, Stratified Sampling, Stratified Random Sampling, Cluster Sampling, Systematic Sampling, Multistage Designs, Double Sampling, Two-Phase Sampling, Network Sampling, Link-Tracing Designs, Detectability, Capture–Recapture Sampling, Line-Intercept Sampling, spatial sampling, Spatial Prediction, Kriging, Spatial Covariance Function, Spatial Designs, Adaptive Sampling Designs, Adaptive Sampling, Adaptive Cluster Sampling, Stratified Adaptive Cluster Sampling
Author: Nasiru Danlami
School: Bayero University, Kano
Department: Engineering
Course Code: CIV3301
Topics: Civil Engineering Procedure, civil engineering, Structural Engineering, Environmental Engineering, Water Resources Engineering, Hydraulic Engineering, Geotechnical Engineering, Construction Engineering, Civil Engineering Design, Applied Civil Engineering Design, Civil Engineering Design Documents, construction process management, site analysis, Site reconnaissance, surveys, measured survey, condition survey, Photographic survey, video surveys, Site Investigation, Foundation design, subsoil examination, trial pits, borehole, Window samplers, Rotary Drilling Equipment, Percussion boring, construction principles, construction equipment, earthing moving equipment, bulldozer, Frontend Loader, Motor Graders, scrapers, truck, Excavating Equipment, construction elements, Foundation construction, foundation types, Strip foundations, Wide strip foundation, Short-bored pile foundations, Pad foundations, Raft foundations
Applied Strength of Materials, 6th Edition
Author: Robert Mott, Joseph Untener
School: Bayero University, Kano
Department: Engineering
Course Code: CIV3308
Topics: Direct Normal stress, stress, strain, Direct shear stress, Screw Threads, Experimental stress analysis, Computational stress analysis, Fundamental of statics, Materials design properties, Properties of steel, Properties of Cast Iron, Properties of Aluminum, Wood, Concrete, Plastics, Composites, Direct stress, Deformation, Computing design stress, Thermal stress, Bearing stress, Design bearing stress, Twisting, Elastic Torsional Deformation, Torsion, Beam loading, Beams supports, Beam types, Supports reactions, Centroids, Complex shapes centroid, Radius of Gyration, section modulus, Flexure formula, General shear formula, Special shear formulas, Shear flow, Beams deflection, combined stress, Columns, Slenderness Ratio, Buckling formula, Pressure vessels, Bolted connections design, Rivet joints, Eccentrically loaded riveted joints, Eccentrically loaded Bolted joints
Author: SO Akinola
School: University of Ibadan
Department: Science and Technology
Course Code: CSC102
Topics: Computing, Computer Science, computers, hardware, software, Computer Networks, Internet, Data Representation, Information Representation, Computer Programming, Python Language, Python, Python Basic Operations, Control Structures, loops, functions, Composite Types
Author: Kutub Thakur, Al-Sakib Khan Pathan
School: Air Force Institute of Technology
Department: Science and Technology
Course Code: CYB102
Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard
Departments
Administration, Social and Management science
Agriculture and Veterinary Medicine
Arts and Humanities
Education
Engineering
General studies
Law
Medical, Pharmaceutical and Health science
Science and Technology