Computer Books
Author: CSC
School: University of Ilorin
Department: Science and Technology
Course Code: CSC112
Topics: program, BASIC
Author: Ophthalmolgy
School: University of Ilorin
Department: Medical, Pharmaceutical and Health science
Course Code: EPIDEMIOLOGY AND COMMUNITY HEALTH500
Topics: software, hardware, storage devices, data analysis, data presentation
Introduction to information theory and applications
Author: CODeL
School: Federal University of Technology, Minna
Department: Science and Technology
Course Code: CIT111, CPT111
Topics: von neuman, data, information, information processing, generations of computer, classifications of computer, number system, computer language, database, communication system, transmission impairment, analog signal, digital signal, Signal Modulation, Signal to Noise Ratio, data encoding, data decoding, transmission media, communication technique, computer network, internet
Upgrading and Repairing PCs, 22nd Edition
Author: Scott Mueller
School: Edo University
Department: Science and Technology
Course Code: CMP317
Topics: electronic computers, computer components, Microprocessor, address bus, Processor Manufacturing, Intel processors, AMD processors, Processor Cooling, over clocking, motherboards, chipsets, BIOS, Motherboard ROM BIOS, ROM hardware, memory, ROM, DRAM, memory standards, memory modules, RAM upgrades, magnetic storage, Flash Memory Devices, removable storage, Solid-State Drives, USB Flash Drives, optical storage, optical technology, DVD, video hardware, Video Display Interfaces, monitors, audio hardware, speaker, microphone, input devices, keyboard, Touchscreen Technology, Internet Connectivity, Local Area Networking, Network Protocols, power supply, Power-Protection Systems, computer System Components, computer diagnostics, boot process
Author: SO Akinola
School: University of Ibadan
Department: Science and Technology
Course Code: CSC102
Topics: Computing, Computer Science, computers, hardware, software, Computer Networks, Internet, Data Representation, Information Representation, Computer Programming, Python Language, Python, Python Basic Operations, Control Structures, loops, functions, Composite Types
Author: Kutub Thakur, Al-Sakib Khan Pathan
School: Air Force Institute of Technology
Department: Science and Technology
Course Code: CYB102
Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard
Digital Logic Circuit Analysis and Design
Author: Victor Nelson, Troy Nagle, Bill Carroll, David Irwin
School: Edo University
Department: Engineering
Course Code: EEE314
Topics: Digital Logic Circuit Analysis, Digital Logic Circuit Design, computing, digital systems, number systems, positional notation, arithmetic, binary arithmetic, octal arithmetic, hexadecimal arithmetic, base conversions, signed number representation, computer codes, numeric codes, error detection codes, correction codes, Boolean algebra, Venn diagram, Duality, switching functions, truth tables, switching circuits, electronic logic gates, combinational circuits, algebraic methods, combinational logic circuits, computer aided design, design cycle, digital circuit modelling, design synthesis, logic simulation, Karnaugh maps, Quine-McCluskey tabular minimization method, Petrick's algorithm, computer aided minimization of switching functions. Modular combinational logic, Decodes, encoders, decoder circuit structures, encoders, multiplexers, demultiplexers, data distributors, adder circuits, comparators, semi custom logic devices, logic array circuits, field-programmable logic arrays, programmable read-only memory, programmable array logic, sequential devices, sequential circuits, memory devices, latches, flip-flops, timing circuits, modular sequential logic shift registers, counters, serial adder unit, serial accumulators, parallel accumulators, multiple-sequence counters, digital fractional rate multipliers, synchronous sequential circuit models, synchronous sequential circuits, registered programmable logic device, programmable gate arrays, sequential circuit design, logic circuit testing, digital logic circuit testing, combinational logic circuit testing, sequential logic circuit testing, electronic slot machine, keyless auto entry system
Author: Yetunde Folajimi
School: University of Ibadan
Department: Science and Technology
Course Code: CSC103
Topics: Programming, computer programming, computer languages, programming process, compilation, coding, debugging, syntax, Programming languages, low-Programming languages, high-Programming languages, Modular Programming Languages, Structured Programming Language, Business Oriented Language, Object oriented programming language, Visual Programming Languages, Algorithm, Problem-Solving, Problem Solving Process, Algorithmic Problem Solving, Pseudo-Codes, Pseudocode, Flowcharts, Flowchart Symbols, Flowcharting, Programming Environment, flowchart, Variables, Reserved Words, operators, Data Types, functions, Data Type, Numbers Manipulation, character manipulation, String Manipulation, Decision-Making, Loops, Conditional Statements, arrays, Computer Files, file input, file output, File Operation Modes
Advanced Cybercrimes and Cyber Security
Author: Macpherson Uchenna Nnam
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS808
Topics: Cybercrime, Cyber Security, Cyber Criminality, Cybercriminals, Cyber Threats, Electronic Evidence, Cybercrime Investigation, Generating Electronic Evidence, Electronic Evidence Handling, Computer Forensics, Computer Forensics Investigation, Computer Forensics Investigation Tools, Anomie-Strain Theory, Differential Association Theory, Situational crime prevention perspective
Electrical Engineering analysis summary
Author: EEE
School: Federal University of Technology, Owerri
Department: Engineering
Course Code: EEE409
Topics: computer aided power system analysis, microcomputer applications, computer studies, power flow analysis
Departments
Administration, Social and Management science
Agriculture and Veterinary Medicine
Arts and Humanities
Education
Engineering
General studies
Law
Medical, Pharmaceutical and Health science
Science and Technology