Books

Search Books...

Cyber Security Books

Cybercrimes

Author: Philip Ndubueze

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS812

Topics: Cybercrime, Cyber Criminology, Child Pornography, Child Grooming, Cyberbullying, Cyberstalking, Cyber Squating, Dark Web, Cryptomarket Operations, Digital Piracy, Hacking, Malware, Online Advance Fee Fraud, Online Identity Theft, Sexting, Revenge Pornography, Differential Association Theory, Routine Activity Theory, Neutralization Theory, Space Transition Theory of Cybercrime, Cybercrime Legislations, International Cybercrime Legislations, International Cybercrime regulations, Studying Cybercrime, Investigating Cybercrime, Digital Forensics, hird Party Policing Strategies, Cybercrime Investigation

Urban Violence and Security

Author: Adedoyin Adedayo

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: PCR362

Topics: Urban Violence, urban Security, Urbanisation, Urban Problems, Urban Transportation System, Urban Centres, urban Planning, conflict, Violent Conflict, Understanding Conflict, Conflict Management Strategies, Security, Human Security, Cooperative Security Efforts, insecurity management

Information Security Principles and Practice, 2nd Edition

Author: Mark Stamp

School: Edo University

Department: Science and Technology

Course Code: CMP318

Topics: information security, cryptography, access control, crypto, Codebook Cipher, Symmetric Key Crypto, block ciphers, Public Key Crypto, Elliptic Curve Cryptography, public key notation, Public Key Infrastructure, has functions, Advanced Cryptanalysis, Engima, Enigma Cipher Machine, authentication, biometrics, authorization, Access Control Matrix, Multilevel Security Models, firewalls, Intrusion Detection Systems, Simple Authentication Protocols, Authentication Protocols, Real-World Security Protocols, software flaws, malware, botnet, Digital Rights Management, Operating Systems, Operating Systems functions, Trusted Operating System

Lecture notes on Computer Systems Security

Author: CSC FUTO

School: Federal University of Technology, Owerri

Department: Science and Technology

Course Code: CSC303

Topics: Computer Systems Security, CIA triad, Computer security threats, virus, botnet, Rootkit, keylogger, Computer Security Practices

The Evolution of International Security Studies

Author: Barry Buzan, Lene Hansen

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS381

Topics: International Security StudiesWestern-centrism conundrum, Cold War, Peace Research, Arms Control, Widening security, deepening security, Constructivism

Peace and Security in a Global Context

Author: Charles Quaker-Dokubo

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: PCR813

Topics: security, Human Security, Conflict, Internally Displaced Persons, Peace Enforcement, Disarmament, Public Safety System, Environmental Degradation, Safety, refugees, Crisis Management, Strategic Studies, Crisis Bargaining, Peace-Making, Peace-Sharing, Demobilization, Reintegration, Africa Security, United Nations, Conflict resolutions, Conflicts Prevention

Principles of Security Practice and Management

Author: Kabir Bello

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS848

Topics: Security Practice, Security Management

International Relations and Security

Author: AJ Oluwadare

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: PCR417

Topics: International Relations, International Security, International Economic Relations, International law, International organisations, integration theory, system theory, balance of power theory, power theory, Intergovernmental Non-State Actors, political power, economic power, socio-cultural power, military power, Securitisation Models, diplomacy, peace models, Collective Security Systems, Global Economic Coalition, functionalist, neo-functionalist, federalist

Environmental Security and Conflict Resolution

Author: Chinasa Ugwuanyi

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: PCR851

Topics: Environmental Security, Conflict Resolution, Environmental Security Analysis, Green Political Theory, political ecology, National Environmental Laws, Multilateral Environmental Agreements, Treaties, International Environmental Law development, Conflict Resolution Techniques, conflict, Conflict Management, Environmental Conflict, Environmental Challenges, Natural Resources

Computer networks and security

Author: CPE FUOYE

School: Federal University, Oye-Ekiti

Department: Engineering

Course Code: CPE101

Topics: Computer networks, computer security, Personal Area Network, local area network, Campus Area Network, Metropolitan Area Network, internetwork, intranet, extranet, internet, Network Interface Cards, router, malware, computer virus, trojan horses, logic bombs, spyware, worms, firewall, anti-virus

Departments

Administration, Social and Management science image

Administration, Social and Management science

Agriculture and Veterinary Medicine image

Agriculture and Veterinary Medicine

Arts and Humanities image

Arts and Humanities

Education image

Education

Engineering image

Engineering

General studies image

General studies

Law image

Law

Medical, Pharmaceutical and Health science image

Medical, Pharmaceutical and Health science

Science and Technology image

Science and Technology