Books

Search Books...

Malware Books

Information Security Principles and Practice, 2nd Edition

Author: Mark Stamp

School: Edo University

Department: Science and Technology

Course Code: CMP318

Topics: information security, cryptography, access control, crypto, Codebook Cipher, Symmetric Key Crypto, block ciphers, Public Key Crypto, Elliptic Curve Cryptography, public key notation, Public Key Infrastructure, has functions, Advanced Cryptanalysis, Engima, Enigma Cipher Machine, authentication, biometrics, authorization, Access Control Matrix, Multilevel Security Models, firewalls, Intrusion Detection Systems, Simple Authentication Protocols, Authentication Protocols, Real-World Security Protocols, software flaws, malware, botnet, Digital Rights Management, Operating Systems, Operating Systems functions, Trusted Operating System

Computer networks and security

Author: CPE FUOYE

School: Federal University, Oye-Ekiti

Department: Engineering

Course Code: CPE101

Topics: Computer networks, computer security, Personal Area Network, local area network, Campus Area Network, Metropolitan Area Network, internetwork, intranet, extranet, internet, Network Interface Cards, router, malware, computer virus, trojan horses, logic bombs, spyware, worms, firewall, anti-virus

Cybercrimes

Author: Philip Ndubueze

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS812

Topics: Cybercrime, Cyber Criminology, Child Pornography, Child Grooming, Cyberbullying, Cyberstalking, Cyber Squating, Dark Web, Cryptomarket Operations, Digital Piracy, Hacking, Malware, Online Advance Fee Fraud, Online Identity Theft, Sexting, Revenge Pornography, Differential Association Theory, Routine Activity Theory, Neutralization Theory, Space Transition Theory of Cybercrime, Cybercrime Legislations, International Cybercrime Legislations, International Cybercrime regulations, Studying Cybercrime, Investigating Cybercrime, Digital Forensics, hird Party Policing Strategies, Cybercrime Investigation

Cybersecurity Fundamentals

Author: Kutub Thakur, Al-Sakib Khan Pathan

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB102

Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard

Departments

Administration, Social and Management science image

Administration, Social and Management science

Agriculture and Veterinary Medicine image

Agriculture and Veterinary Medicine

Arts and Humanities image

Arts and Humanities

Education image

Education

Engineering image

Engineering

General studies image

General studies

Law image

Law

Medical, Pharmaceutical and Health science image

Medical, Pharmaceutical and Health science

Science and Technology image

Science and Technology