Computers Books
Systemic programming with Paschal, 2nd edition
Author: SOP Oliomogbe
School: University of Benin
Department: Science and Technology
Course Code: CSC211
Topics: computers, computer software, files, programming principles, stages of programming, structured flowchart, pascal character set, identifiers, Numbers, Integer numbers, Real Numbers, string, Datatypes, constant, Paschal syntax diagrams, Integer-type data, Boolean type data, read statement, Readln statement, EOF functions, EOLN functions, WRITE statement, WRITELN statement, arrays, packaged arrays, procedures, functions, invoking functions, recursion, Top-Down analysis, Modular programming, structured coding, top-down analysis
Author: SO Akinola
School: University of Ibadan
Department: Science and Technology
Course Code: CSC102
Topics: Computing, Computer Science, computers, hardware, software, Computer Networks, Internet, Data Representation, Information Representation, Computer Programming, Python Language, Python, Python Basic Operations, Control Structures, loops, functions, Composite Types
The use of computer in Obstetrics and Gynaecology
Author: JT Mutihir
School: University of Ilorin
Department: Medical, Pharmaceutical and Health science
Course Code: OBSTETRICS AND GYNECOLOGY
Topics: Computers in Medicine, Data Processing, Uses of the Computer, AUTOMATED IMAGING TECHNIQUES, Ultrasound scanning, Cardiotocograph, Magnetic radioactive imaging
Author: Adebisi Adesola, Mustapha Momoh, Caroline Aturu-Aghedo
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: BUS815
Topics: Management Information System, Information System, Communication Technologies, Computers, Information Processing, Information Systems Development, Network Systems, Data Modelling
Author: Kutub Thakur, Al-Sakib Khan Pathan
School: Air Force Institute of Technology
Department: Science and Technology
Course Code: CYB102
Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard
Departments
Administration, Social and Management science
Agriculture and Veterinary Medicine
Arts and Humanities
Education
Engineering
General studies
Law
Medical, Pharmaceutical and Health science
Science and Technology