Computer Codes Books
Author: SO Akinola
School: University of Ibadan
Department: Science and Technology
Course Code: CSC102
Topics: Computing, Computer Science, computers, hardware, software, Computer Networks, Internet, Data Representation, Information Representation, Computer Programming, Python Language, Python, Python Basic Operations, Control Structures, loops, functions, Composite Types
Author: Kutub Thakur, Al-Sakib Khan Pathan
School: Air Force Institute of Technology
Department: Science and Technology
Course Code: CYB102
Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard
Advanced Cybercrimes and Cyber Security
Author: Macpherson Uchenna Nnam
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS808
Topics: Cybercrime, Cyber Security, Cyber Criminality, Cybercriminals, Cyber Threats, Electronic Evidence, Cybercrime Investigation, Generating Electronic Evidence, Electronic Evidence Handling, Computer Forensics, Computer Forensics Investigation, Computer Forensics Investigation Tools, Anomie-Strain Theory, Differential Association Theory, Situational crime prevention perspective
Encyclopedia of Applied Ethics ,2nd edition
Author: Ruth Chadwick
School: University of Ibadan
Department: Arts and Humanities
Course Code: PHI203
Topics: Applied Ethics, abortion, accounting, business ethics, acts, omissions, addiction, adoption, advance directives, advertising, affirmative action, affordable housing, ageism, agricultural ethics, AIDS, altruism, economics, animal research, animal rights, Anthropocentrism, Archaeological Ethics, Aristotelian Ethics, Auditing Practices, arts, autonomy, benefit sharing, biobanks, Biocentrism, biodiversitybioethics, Bioinformatics, biopower, foucault, biotechnology, bioterrorism, border control, brain death, broadcast journalism, Buddhism, business ethics, capital punishment, casuistry, censorship, child abuse, Children’s Rights, Christian Ethics, citzenship, civil disobedience, climate change, clinical ethics, cloning, codes of ethics, collective guilt, communication ethics, Communitarianism, Community Consent, Complementary Medicine, information ethics, Computer Security, Confidentiality, Conflict of Interest, Confucianism, conjoined twins, Conscientious Objection, Consequentialism, Deontology, consumer rights, Contractarian Ethics, Corporate Ethics, Reputation Management, Corporate Governance, Corporate Responsibility, cosmetic surgery, Cosmopolitanism
Introduction to News Writing & Reporting
Author: Oloruntola Sunday
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: MAC121, JLS721, JLS823
Topics: News Writing, News Reporting, Print Journalism, Covering Speeches, Broadcast Journalism, Broadcast Style Book, Preparing Broadcast Copy, Interviewing, Online Journalism, Computer-Assisted Journalism, Ethical Journalist, Codes of Journalistic Ethics, Writing Advert Copy, Public Relations Writing
Author: Fleddermann, Fleddermann Charles Byrns
School: National Open University of Nigeria
Department: Arts and Humanities
Course Code: PHL242
Topics: Engineering ethics, personal ethics, professional ethics, codes of ethics, ethical theories, Non-Western Ethical Thinking, Ethical Problem-Solving Techniques, line drawing, flow charting, conflict problems, risk, safety, accidents, professional responsibilities, professional rights, Whistle-Blowing, environmental ethics, computer ethics, doing the right thing
Electrical Engineering analysis summary
Author: EEE
School: Federal University of Technology, Owerri
Department: Engineering
Course Code: EEE409
Topics: computer aided power system analysis, microcomputer applications, computer studies, power flow analysis
Author: WMC McKenzie
School: Bayero University, Kano
Department: Engineering
Course Code: CIV3307
Topics: Structural elements design, Structural Analysis Techniques, Shear Force, Bending moment, Shear force diagram, Bending moment diagram, Deflection of Beams, Elastic Shear stress distribution, Elastic Bending stress distribution, Transformed sections, Moment distribution, Bending stiffness, Rotational Stiffness, Carry-over moment, Pinned End, Free Moments, Fixed bending moments, Distribution Factors, Design Philosophies, Permissible stress Design, Load Factor Design, Limit State Design, Design codes, Eurocodes, National Annex, Structural Loading, Dead loads, Imposed loads, Imposed roof loads, Floor load distribution, Load distribution, Structural Instability, Overall Stability, Robustness, Reinforced concrete Element's Design, Structural Steelwork Elements' Design, Structural Timber Elements' Design.
Information technology in engineering
Author: ENG
School: Chukwuemeka Odumegwu Ojukwu University
Department: Engineering
Course Code: ENG106
Topics: Information technology, Computer skills, Computer Components, Hardware, Malicious Software, Worms, Trojan horses
Operating System Concepts, 10th edition
Author: Abraham Silberschatz, Greg Gagne, Peter Galvin
School: Edo University
Department: Science and Technology
Course Code: CSC212
Topics: Operating System, Computer-System Organization, Computer-System Architecture, Operating-System Operations, Operating-System Structures, Operating-System Services, user interface, operating system interface, distributed systems, kernel data structures, Operating-System Debugging, process management, process scheduling, interprocess communication, Multicore Programming, Multithreading Models, Implicit Threading, CPU Scheduling, Multi-Processor Scheduling, Real-Time CPU Scheduling, Algorithm Evaluation, process synchronization, POSIX Synchronization, dead locks, memory management, Contiguous Memory Allocation, virtual memory, storage management, HDD Scheduling, NVM Scheduling, error detection, storage device management, RAID structure, file system, file-system interface, file-system implementation, file-system structure, file-system operations, directory implementation, Free-Space Management, File-System Internals, File-System Mounting, file sharing, virtual file systems, remote file systems, security, program threats, Cryptography, Role-Based Access Control, access matrix, virtual machines, networks, Distributed File Systems, remote file access, Linux system, Kernel Modules, programmer interface
Departments
Administration, Social and Management science
Agriculture and Veterinary Medicine
Arts and Humanities
Education
Engineering
General studies
Law
Medical, Pharmaceutical and Health science
Science and Technology