Books

Search Books...

Computers Books

Systemic programming with Paschal, 2nd edition

Author: SOP Oliomogbe

School: University of Benin

Department: Science and Technology

Course Code: CSC211

Topics: computers, computer software, files, programming principles, stages of programming, structured flowchart, pascal character set, identifiers, Numbers, Integer numbers, Real Numbers, string, Datatypes, constant, Paschal syntax diagrams, Integer-type data, Boolean type data, read statement, Readln statement, EOF functions, EOLN functions, WRITE statement, WRITELN statement, arrays, packaged arrays, procedures, functions, invoking functions, recursion, Top-Down analysis, Modular programming, structured coding, top-down analysis

Introduction to Computing

Author: SO Akinola

School: University of Ibadan

Department: Science and Technology

Course Code: CSC102

Topics: Computing, Computer Science, computers, hardware, software, Computer Networks, Internet, Data Representation, Information Representation, Computer Programming, Python Language, Python, Python Basic Operations, Control Structures, loops, functions, Composite Types

The use of computer in Obstetrics and Gynaecology

Author: JT Mutihir

School: University of Ilorin

Department: Medical, Pharmaceutical and Health science

Course Code: OBSTETRICS AND GYNECOLOGY

Topics: Computers in Medicine, Data Processing, Uses of the Computer, AUTOMATED IMAGING TECHNIQUES, Ultrasound scanning, Cardiotocograph, Magnetic radioactive imaging

Management Information System

Author: Adebisi Adesola, Mustapha Momoh, Caroline Aturu-Aghedo

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: BUS815

Topics: Management Information System, Information System, Communication Technologies, Computers, Information Processing, Information Systems Development, Network Systems, Data Modelling

Cybersecurity Fundamentals

Author: Kutub Thakur, Al-Sakib Khan Pathan

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB102

Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard

Departments

Administration, Social and Management science image

Administration, Social and Management science

Agriculture and Veterinary Medicine image

Agriculture and Veterinary Medicine

Arts and Humanities image

Arts and Humanities

Education image

Education

Engineering image

Engineering

General studies image

General studies

Law image

Law

Medical, Pharmaceutical and Health science image

Medical, Pharmaceutical and Health science

Science and Technology image

Science and Technology