Books

Search Books...

Parallel Networks Books

Handbook on Decision Support Systems 1

Author: Frada Burstein, Clyde Holsapple

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: MBA853

Topics: Decision Support Systems, Information Systems, Decision-Making Process, decisions, knowledge, Decision Making, Sensemaking, Data Quality, Decision Makers, Decision Support, Knowledge Management, Integrated Document Management, Online Analytical Processing, Spreadsheet-Based Decision Support Systems, Multi-Criteria Decision Support, Web-Based Decision Support, MULTIPARTICIPANT DECISION SUPPORT SYSTEMS, Group Decision Support Systems, Organizational Decision Support Systems, Negotiation Support, E-negotiation Systems, INTELLIGENT DECISION SUPPORT SYSTEMS, Artificial Neural Networks, Data Mining, Data Fusion, Enhanced Decision Support, Adaptive Decision Support Systems, COMPUTER-BASED DECISION SUPPORT, Decision Support Systems Failure

Data Communications and Networking ,4th edition

Author: Behrouz Forouzan, Sophia Chung Fegan

School: National Open University of Nigeria

Department: Science and Technology

Course Code: CIT891

Topics: Data Communications, Networking, data, signals, digital transmission, analog transmission, bandwidth utilization, transmission media, switching, data link layer, error detection, error correction, data link control, multiple access, wireless LAN, ethernet, SONET, SDH, virtual-circuit networks, frame relay, network layer, logical addressing, internet protocol, address mapping, error reporting, multicasting, transport layer, domain name system, remote logging, electronic mail, file transfer, HTTP, network management, SNMP, multimedia, cryptography, network security

Cybersecurity Fundamentals

Author: Kutub Thakur, Al-Sakib Khan Pathan

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB102

Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard

Departments

Administration, Social and Management science image

Administration, Social and Management science

Agriculture and Veterinary Medicine image

Agriculture and Veterinary Medicine

Arts and Humanities image

Arts and Humanities

Education image

Education

Engineering image

Engineering

General studies image

General studies

Law image

Law

Medical, Pharmaceutical and Health science image

Medical, Pharmaceutical and Health science

Science and Technology image

Science and Technology