Computer Networks Books
Author: CPE FUOYE
School: Federal University, Oye-Ekiti
Department: Engineering
Course Code: CPE101
Topics: Programming, Programming Language, Machine Language, Assembly language, High level language, Very high level language, Program debugging, Program testing, Algorithms, flowchart, Flowchart Symbols, Pseudocode
Accounting Computer Package SAQ Answers
Author: Mohammed Abba
School: Modibbo Adama University of Technology
Department: Medical, Pharmaceutical and Health science
Course Code: AC410
Topics: data, entering data, printing data, formatting data, mathematical computation, formula, statistical functions, charts, formatting charts
Author: Mohammed Abba
School: Modibbo Adama University of Technology
Department: Medical, Pharmaceutical and Health science
Course Code: AC410
Topics: data, entering data, printing data, formatting data, mathematical computation, formula, statistical functions, charts, formatting charts
Author: CSC
School: University of Ilorin
Department: Science and Technology
Course Code: CSC112
Topics: program, BASIC
Author: Ophthalmolgy
School: University of Ilorin
Department: Medical, Pharmaceutical and Health science
Course Code: EPIDEMIOLOGY AND COMMUNITY HEALTH500
Topics: software, hardware, storage devices, data analysis, data presentation
Author: SO Akinola
School: University of Ibadan
Department: Science and Technology
Course Code: CSC102
Topics: Computing, Computer Science, computers, hardware, software, Computer Networks, Internet, Data Representation, Information Representation, Computer Programming, Python Language, Python, Python Basic Operations, Control Structures, loops, functions, Composite Types
Author: Kutub Thakur, Al-Sakib Khan Pathan
School: Air Force Institute of Technology
Department: Science and Technology
Course Code: CYB102
Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard
Introduction to information theory and applications
Author: CODeL
School: Federal University of Technology, Minna
Department: Science and Technology
Course Code: CIT111, CPT111
Topics: von neuman, data, information, information processing, generations of computer, classifications of computer, number system, computer language, database, communication system, transmission impairment, analog signal, digital signal, Signal Modulation, Signal to Noise Ratio, data encoding, data decoding, transmission media, communication technique, computer network, internet
Operating System Concepts, 10th edition
Author: Abraham Silberschatz, Greg Gagne, Peter Galvin
School: Edo University
Department: Science and Technology
Course Code: CSC212
Topics: Operating System, Computer-System Organization, Computer-System Architecture, Operating-System Operations, Operating-System Structures, Operating-System Services, user interface, operating system interface, distributed systems, kernel data structures, Operating-System Debugging, process management, process scheduling, interprocess communication, Multicore Programming, Multithreading Models, Implicit Threading, CPU Scheduling, Multi-Processor Scheduling, Real-Time CPU Scheduling, Algorithm Evaluation, process synchronization, POSIX Synchronization, dead locks, memory management, Contiguous Memory Allocation, virtual memory, storage management, HDD Scheduling, NVM Scheduling, error detection, storage device management, RAID structure, file system, file-system interface, file-system implementation, file-system structure, file-system operations, directory implementation, Free-Space Management, File-System Internals, File-System Mounting, file sharing, virtual file systems, remote file systems, security, program threats, Cryptography, Role-Based Access Control, access matrix, virtual machines, networks, Distributed File Systems, remote file access, Linux system, Kernel Modules, programmer interface
Upgrading and Repairing PCs, 22nd Edition
Author: Scott Mueller
School: Edo University
Department: Science and Technology
Course Code: CMP317
Topics: electronic computers, computer components, Microprocessor, address bus, Processor Manufacturing, Intel processors, AMD processors, Processor Cooling, over clocking, motherboards, chipsets, BIOS, Motherboard ROM BIOS, ROM hardware, memory, ROM, DRAM, memory standards, memory modules, RAM upgrades, magnetic storage, Flash Memory Devices, removable storage, Solid-State Drives, USB Flash Drives, optical storage, optical technology, DVD, video hardware, Video Display Interfaces, monitors, audio hardware, speaker, microphone, input devices, keyboard, Touchscreen Technology, Internet Connectivity, Local Area Networking, Network Protocols, power supply, Power-Protection Systems, computer System Components, computer diagnostics, boot process
Departments
Administration, Social and Management science
Agriculture and Veterinary Medicine
Arts and Humanities
Education
Engineering
General studies
Law
Medical, Pharmaceutical and Health science
Science and Technology