Books

Search Books...

Computer Security Books

State Security Objectives and International Security Protocols

Author: Ndukaeze Nwabueze, Waziri Adisa

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS877

Topics: State Security, International Security Protocols, War, Conflicts, International Security Politics, Strategic Conflict Management, Private Security Protocols, Global Conflicts, Peace Building

Computer networks and security

Author: CPE FUOYE

School: Federal University, Oye-Ekiti

Department: Engineering

Course Code: CPE101

Topics: Computer networks, computer security, Personal Area Network, local area network, Campus Area Network, Metropolitan Area Network, internetwork, intranet, extranet, internet, Network Interface Cards, router, malware, computer virus, trojan horses, logic bombs, spyware, worms, firewall, anti-virus

Cybersecurity Fundamentals

Author: Kutub Thakur, Al-Sakib Khan Pathan

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB102

Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard

Computer Aided Design/Computer Aided Manufacturing

Author: Gerald Onuoha

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: MEE505

Topics: Computer Aided Design, Computer Aided Manufacturing, computer integrated manufacturing, computer aided techniques, flexible manufacturing system, CNC programming, Lathe operation, CNC milling chamfering

Types and Analysis of Security Threats

Author: Monsuru Adegboyega Kasali

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS244

Topics: Security Threat, Manmade Threats, Information Warfare, Geological Security Threat, Geological Security Threat Hazard, Climatic Security Threat, Climatic Security Hazard, Environmental Security Threat, Environmental Security hazard, Threat Mitigation, risk, Vulnerability, Capacity Assessment, Crime Analysis, Crime Mitigation, Data Mining, Automated Data Analysis, Crime Management

Legal and Social framework of Private Security in Nigeria

Author: Niyi Adegoke

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS746

Topics: Private Security, Security, Private Security Sector, Private Security Company, Risk Analysis, Security Survey, Nigerian Security and Civil Defence Corps, Private Security Service

Applications of Computer in Business

Author: Gerald Okeke

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: SMS208, CIT202

Topics: computer applications, computer hardware, computer software, computer operations, operating systems, Computer Application Systems, Database Management System, Systems Development Life Cycle, computer networks, internet, computer security, Information Communication Technology, Processing Devices, storage, input Devices output Devices

Information System Security Management

Author: AD Ikuomola

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS343

Topics: Information System Security Management, Information gathering, Information security, system analysis, system design, Information system security, information security integration, information communication technology, information assurance, information systems usability, business security, Risk assessment, Risk mitigation options, Mitigating economic risk, Information age militaries, Information technology impacts, information security investment

Introduction to computer science

Author: OE Ojo

School: Federal University of Agriculture, Abeokuta

Department: Science and Technology

Course Code: CSC101

Topics: computer, generations of computer, computer, computer classes, computing origin, hybrid computer, input devices, output devices, computer storage, arithmetic logic unit, memory, computer software, system software, language translator, application software, data processing, data processing technique, Microsoft windows

Introduction to Computer Science

Author: Samuel Oluwadare

School: National Open University of Nigeria

Department: Agriculture and Veterinary Medicine

Course Code: AGE202

Topics: Computer Science, computer hardware, Peripheral Devices, Computer Software, Computer Languages, Computer Programming, Flowcharts, Algorithms, Visual Basic Project Window, Analysing Visual Basic Data, Computer Virus, Input Devices, Computer Keyboard, Output Devices, printers, monitors, scanners, speakers, Air Conditioner, Voltage Stabiliser, Line Voltage Transformer, Uninterruptible Power Supply System

Departments

Administration, Social and Management science image

Administration, Social and Management science

Agriculture and Veterinary Medicine image

Agriculture and Veterinary Medicine

Arts and Humanities image

Arts and Humanities

Education image

Education

Engineering image

Engineering

General studies image

General studies

Law image

Law

Medical, Pharmaceutical and Health science image

Medical, Pharmaceutical and Health science

Science and Technology image

Science and Technology