Books

Search Books...

Cyber Security Books

Contemporary Security Studies, Third Edition

Author: Alan Collins

School: Obafemi Awolowo University

Department: Administration, Social and Management science

Course Code: IRS208

Topics: Contemporary Security Studies, realism, liberalism, historical materialism, peace studies, critical security studies, social constructivism, human security, gender, security, securitization, military security, regime security, societal security, environmental security, economic security, globalization, development, security, traditional security, non-traditional security, coercive diplomacy, weapons of mass destruction, terrorism, humanitarian intervention, energy security, defence trade, health and security, transnational crime, cyber security, child soldiers

Contemporary security studies ,3rd edition

Author: Alan collins

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS381

Topics: realism, liberalism, historical materialism, peace studies, security studies, critical security studies, social constructivism, human security, gender and security, securitization, Military security, regime security, societal security, environmental security, economic security, globalization, development, security, traditional security, non-traditional security, coercive diplomacy, weapons of mass destruction, terrorism, humanitarion intervention, energy security, defence trade, health and security, transnational crime, cyber-security, child soldiers

Advanced Cybercrimes and Cyber Security

Author: Macpherson Uchenna Nnam

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS808

Topics: Cybercrime, Cyber Security, Cyber Criminality, Cybercriminals, Cyber Threats, Electronic Evidence, Cybercrime Investigation, Generating Electronic Evidence, Electronic Evidence Handling, Computer Forensics, Computer Forensics Investigation, Computer Forensics Investigation Tools, Anomie-Strain Theory, Differential Association Theory, Situational crime prevention perspective

Security Planning, Development and Organization

Author: Darlington Ikpi

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS245

Topics: Security Planning, Company Business Interest, Security Planning, Security Development, Security Organization, Private Security Operation, Public Security, Private Security, Security Survey System, National Interest, Security Staff, Security Staff Supervisors, Patrol Procedures, Patrol Techniques, Loss Prevention, loss Control, Security Policy, Security Design, Security Procedures

Cybersecurity Fundamentals

Author: Kutub Thakur, Al-Sakib Khan Pathan

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB102

Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard

Public and Private Security Partnership

Author: Moses Ikoh

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS807

Topics: Public and Private Security Partnership, Public-Private Security, Liberalization of Security, Public-Private Partnerships for Security, Security cooperation, Inclusive Security, National Security, Value of Security, Community Security, Social Cohesion, Security partnership, Security collaborations, Critical Security Targets

Effective Security Management ,Seventh Edition

Author: Charles Sennewald, Curtis Baillie

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS245, CSS744

Topics: security management, Organizational structure, security director’s role, security supervisor’s role, individual security employee, Ethics, conflicts of interest, Security personnel management, Hiring security personnel, Discipline, Promotions, Communication, Operational management, Planning, budgeting, Program management, Problem solving, risk, Crisis management, security survey, International security standards, Office administration, Written policies, Written procedures, effective security management, security management tool, security management, Community relations, Mismanagement, Jackass management traits

Cyber criminology and vulnerabilities

Author: Philip Ndubueze, Dickson Ogbonnaya Igwe

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS852

Topics: Cyber criminology, Cyber vulnerabilities, Cyber Crime, Cyberspace Threats, Cyberspace Vulnerabilities, Cyber Victimization, Profiling Cybercrime Offenders, Profiling Cybercrime Victims, Cyber Crime Legislations, Cyber Security Strategies

Guide to Computer Network Security, 4th edition

Author: Joseph Migga Kizza

School: University of Ilorin

Department: Engineering

Course Code: ICS308, TCS407, TCS408

Topics: computer network, computer network security, security threats, Computer Network Vulnerabilities, cyber crimes, hackers, scripting, web workers, security assessment, security analysis, security assurance, disaster management, access control, authorization, authentication, cryptography, firewall, intrusion detection, intrusion prevention, computer forensics, network forensics, virus filtering, content filtering, computer network security protocol, wireless networks, wireless devices, sensor network, Virtualization Technology, Virtualization security, cloud computing, cloud computing security, mobile systems, Internet of Things

Legal and Social Framework of Private Security Services in Nigeria

Author: Niyi Adegoke

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS246

Topics: Security, Private Security, Private Security Sector, Private Security Company, Risk Analysis, Security Survey, Private Security Service, Information Security, Nigerian Security and Civil Defence Corps, Security threat

Departments

Administration, Social and Management science image

Administration, Social and Management science

Agriculture and Veterinary Medicine image

Agriculture and Veterinary Medicine

Arts and Humanities image

Arts and Humanities

Education image

Education

Engineering image

Engineering

General studies image

General studies

Law image

Law

Medical, Pharmaceutical and Health science image

Medical, Pharmaceutical and Health science

Science and Technology image

Science and Technology

Novrazbb Yotjob distinctquote yourowndir muttcat scholarship carlesto newsfunt