Cyber Security Books
Contemporary Security Studies, Third Edition
Author: Alan Collins
School: Obafemi Awolowo University
Department: Administration, Social and Management science
Course Code: IRS208
Topics: Contemporary Security Studies, realism, liberalism, historical materialism, peace studies, critical security studies, social constructivism, human security, gender, security, securitization, military security, regime security, societal security, environmental security, economic security, globalization, development, security, traditional security, non-traditional security, coercive diplomacy, weapons of mass destruction, terrorism, humanitarian intervention, energy security, defence trade, health and security, transnational crime, cyber security, child soldiers
Contemporary security studies ,3rd edition
Author: Alan collins
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS381
Topics: realism, liberalism, historical materialism, peace studies, security studies, critical security studies, social constructivism, human security, gender and security, securitization, Military security, regime security, societal security, environmental security, economic security, globalization, development, security, traditional security, non-traditional security, coercive diplomacy, weapons of mass destruction, terrorism, humanitarion intervention, energy security, defence trade, health and security, transnational crime, cyber-security, child soldiers
Advanced Cybercrimes and Cyber Security
Author: Macpherson Uchenna Nnam
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS808
Topics: Cybercrime, Cyber Security, Cyber Criminality, Cybercriminals, Cyber Threats, Electronic Evidence, Cybercrime Investigation, Generating Electronic Evidence, Electronic Evidence Handling, Computer Forensics, Computer Forensics Investigation, Computer Forensics Investigation Tools, Anomie-Strain Theory, Differential Association Theory, Situational crime prevention perspective
Security Planning, Development and Organization
Author: Darlington Ikpi
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS245
Topics: Security Planning, Company Business Interest, Security Planning, Security Development, Security Organization, Private Security Operation, Public Security, Private Security, Security Survey System, National Interest, Security Staff, Security Staff Supervisors, Patrol Procedures, Patrol Techniques, Loss Prevention, loss Control, Security Policy, Security Design, Security Procedures
Author: Kutub Thakur, Al-Sakib Khan Pathan
School: Air Force Institute of Technology
Department: Science and Technology
Course Code: CYB102
Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard
Public and Private Security Partnership
Author: Moses Ikoh
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS807
Topics: Public and Private Security Partnership, Public-Private Security, Liberalization of Security, Public-Private Partnerships for Security, Security cooperation, Inclusive Security, National Security, Value of Security, Community Security, Social Cohesion, Security partnership, Security collaborations, Critical Security Targets
Effective Security Management ,Seventh Edition
Author: Charles Sennewald, Curtis Baillie
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS245, CSS744
Topics: security management, Organizational structure, security director’s role, security supervisor’s role, individual security employee, Ethics, conflicts of interest, Security personnel management, Hiring security personnel, Discipline, Promotions, Communication, Operational management, Planning, budgeting, Program management, Problem solving, risk, Crisis management, security survey, International security standards, Office administration, Written policies, Written procedures, effective security management, security management tool, security management, Community relations, Mismanagement, Jackass management traits
Cyber criminology and vulnerabilities
Author: Philip Ndubueze, Dickson Ogbonnaya Igwe
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS852
Topics: Cyber criminology, Cyber vulnerabilities, Cyber Crime, Cyberspace Threats, Cyberspace Vulnerabilities, Cyber Victimization, Profiling Cybercrime Offenders, Profiling Cybercrime Victims, Cyber Crime Legislations, Cyber Security Strategies
Guide to Computer Network Security, 4th edition
Author: Joseph Migga Kizza
School: University of Ilorin
Department: Engineering
Course Code: ICS308, TCS407, TCS408
Topics: computer network, computer network security, security threats, Computer Network Vulnerabilities, cyber crimes, hackers, scripting, web workers, security assessment, security analysis, security assurance, disaster management, access control, authorization, authentication, cryptography, firewall, intrusion detection, intrusion prevention, computer forensics, network forensics, virus filtering, content filtering, computer network security protocol, wireless networks, wireless devices, sensor network, Virtualization Technology, Virtualization security, cloud computing, cloud computing security, mobile systems, Internet of Things
Legal and Social Framework of Private Security Services in Nigeria
Author: Niyi Adegoke
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS246
Topics: Security, Private Security, Private Security Sector, Private Security Company, Risk Analysis, Security Survey, Private Security Service, Information Security, Nigerian Security and Civil Defence Corps, Security threat
Departments
Administration, Social and Management science
Agriculture and Veterinary Medicine
Arts and Humanities
Education
Engineering
General studies
Law
Medical, Pharmaceutical and Health science
Science and Technology