Malware Books
Information Security Principles and Practice, 2nd Edition
Author: Mark Stamp
School: Edo University
Department: Science and Technology
Course Code: CMP318
Topics: information security, cryptography, access control, crypto, Codebook Cipher, Symmetric Key Crypto, block ciphers, Public Key Crypto, Elliptic Curve Cryptography, public key notation, Public Key Infrastructure, has functions, Advanced Cryptanalysis, Engima, Enigma Cipher Machine, authentication, biometrics, authorization, Access Control Matrix, Multilevel Security Models, firewalls, Intrusion Detection Systems, Simple Authentication Protocols, Authentication Protocols, Real-World Security Protocols, software flaws, malware, botnet, Digital Rights Management, Operating Systems, Operating Systems functions, Trusted Operating System
Computer networks and security
Author: CPE FUOYE
School: Federal University, Oye-Ekiti
Department: Engineering
Course Code: CPE101
Topics: Computer networks, computer security, Personal Area Network, local area network, Campus Area Network, Metropolitan Area Network, internetwork, intranet, extranet, internet, Network Interface Cards, router, malware, computer virus, trojan horses, logic bombs, spyware, worms, firewall, anti-virus
Author: Philip Ndubueze
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS812
Topics: Cybercrime, Cyber Criminology, Child Pornography, Child Grooming, Cyberbullying, Cyberstalking, Cyber Squating, Dark Web, Cryptomarket Operations, Digital Piracy, Hacking, Malware, Online Advance Fee Fraud, Online Identity Theft, Sexting, Revenge Pornography, Differential Association Theory, Routine Activity Theory, Neutralization Theory, Space Transition Theory of Cybercrime, Cybercrime Legislations, International Cybercrime Legislations, International Cybercrime regulations, Studying Cybercrime, Investigating Cybercrime, Digital Forensics, hird Party Policing Strategies, Cybercrime Investigation
Author: Kutub Thakur, Al-Sakib Khan Pathan
School: Air Force Institute of Technology
Department: Science and Technology
Course Code: CYB102
Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard
Departments
Administration, Social and Management science
Agriculture and Veterinary Medicine
Arts and Humanities
Education
Engineering
General studies
Law
Medical, Pharmaceutical and Health science
Science and Technology