Computer Security Books
State Security Objectives and International Security Protocols
Author: Ndukaeze Nwabueze, Waziri Adisa
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS877
Topics: State Security, International Security Protocols, War, Conflicts, International Security Politics, Strategic Conflict Management, Private Security Protocols, Global Conflicts, Peace Building
Computer networks and security
Author: CPE FUOYE
School: Federal University, Oye-Ekiti
Department: Engineering
Course Code: CPE101
Topics: Computer networks, computer security, Personal Area Network, local area network, Campus Area Network, Metropolitan Area Network, internetwork, intranet, extranet, internet, Network Interface Cards, router, malware, computer virus, trojan horses, logic bombs, spyware, worms, firewall, anti-virus
Author: Kutub Thakur, Al-Sakib Khan Pathan
School: Air Force Institute of Technology
Department: Science and Technology
Course Code: CYB102
Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard
Computer Aided Design/Computer Aided Manufacturing
Author: Gerald Onuoha
School: Federal University of Technology, Owerri
Department: Engineering
Course Code: MEE505
Topics: Computer Aided Design, Computer Aided Manufacturing, computer integrated manufacturing, computer aided techniques, flexible manufacturing system, CNC programming, Lathe operation, CNC milling chamfering
Types and Analysis of Security Threats
Author: Monsuru Adegboyega Kasali
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS244
Topics: Security Threat, Manmade Threats, Information Warfare, Geological Security Threat, Geological Security Threat Hazard, Climatic Security Threat, Climatic Security Hazard, Environmental Security Threat, Environmental Security hazard, Threat Mitigation, risk, Vulnerability, Capacity Assessment, Crime Analysis, Crime Mitigation, Data Mining, Automated Data Analysis, Crime Management
Legal and Social framework of Private Security in Nigeria
Author: Niyi Adegoke
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS746
Topics: Private Security, Security, Private Security Sector, Private Security Company, Risk Analysis, Security Survey, Nigerian Security and Civil Defence Corps, Private Security Service
Applications of Computer in Business
Author: Gerald Okeke
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: SMS208, CIT202
Topics: computer applications, computer hardware, computer software, computer operations, operating systems, Computer Application Systems, Database Management System, Systems Development Life Cycle, computer networks, internet, computer security, Information Communication Technology, Processing Devices, storage, input Devices output Devices
Information System Security Management
Author: AD Ikuomola
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS343
Topics: Information System Security Management, Information gathering, Information security, system analysis, system design, Information system security, information security integration, information communication technology, information assurance, information systems usability, business security, Risk assessment, Risk mitigation options, Mitigating economic risk, Information age militaries, Information technology impacts, information security investment
Introduction to computer science
Author: OE Ojo
School: Federal University of Agriculture, Abeokuta
Department: Science and Technology
Course Code: CSC101
Topics: computer, generations of computer, computer, computer classes, computing origin, hybrid computer, input devices, output devices, computer storage, arithmetic logic unit, memory, computer software, system software, language translator, application software, data processing, data processing technique, Microsoft windows
Introduction to Computer Science
Author: Samuel Oluwadare
School: National Open University of Nigeria
Department: Agriculture and Veterinary Medicine
Course Code: AGE202
Topics: Computer Science, computer hardware, Peripheral Devices, Computer Software, Computer Languages, Computer Programming, Flowcharts, Algorithms, Visual Basic Project Window, Analysing Visual Basic Data, Computer Virus, Input Devices, Computer Keyboard, Output Devices, printers, monitors, scanners, speakers, Air Conditioner, Voltage Stabiliser, Line Voltage Transformer, Uninterruptible Power Supply System
Departments
Administration, Social and Management science
Agriculture and Veterinary Medicine
Arts and Humanities
Education
Engineering
General studies
Law
Medical, Pharmaceutical and Health science
Science and Technology