Books

Search Books...

Security Books

Legal and Social framework of Private Security in Nigeria

Author: Niyi Adegoke

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS746

Topics: Private Security, Security, Private Security Sector, Private Security Company, Risk Analysis, Security Survey, Nigerian Security and Civil Defence Corps, Private Security Service

Information System Security Management

Author: AD Ikuomola

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS343

Topics: Information System Security Management, Information gathering, Information security, system analysis, system design, Information system security, information security integration, information communication technology, information assurance, information systems usability, business security, Risk assessment, Risk mitigation options, Mitigating economic risk, Information age militaries, Information technology impacts, information security investment

Principles of Security Practice and Management

Author: Monsuru Adegboyega Kasali

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS243, CSS743

Topics: Security Practice, Security Management, Security, Violence, Violent Crime, Domestic Violence, Crime Control, Intelligence, Intelligence Collection, Intelligence Disciplines, Intelligence Analysis, Intelligence Evaluation, Counter-Intelligence, Intelligence Security Management, Security Personnel Management, Job Stress, Trauma Management, Operational Management, Capacity Planning, Asymmetric Aggression

Technical Electronics Aspects of Security

Author: RA Okunola, AT Adegoke

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS441, CSS747

Topics: E-Security, Electronic Risks, Risk Management Framework, Electronic Document Security, Electronic Security, Electronic Voting System, Electronic Banking, Electronic Data Interchange Messaging Security, Information Security

Africa in Regional and Global Security

Author: John Tor Tsuwa

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: INR462

Topics: Security in Africa, Peace Operations, Peacekeeping, Peace Enforcement, African Union, ECOWAS, Regional Security, Post-Colonial Africa, Southern African Development Community, Security in South Africa, East African Community, Security in Eastern Africa, United Nations Peace and Security Missions

Cybersecurity Fundamentals

Author: Kutub Thakur, Al-Sakib Khan Pathan

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB102

Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard

Introduction to Homeland Security ,4th edition

Author: Jane Bullock, George Haddow, Damon Coppola

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS245, CSS744

Topics: Homeland Security, Terrorist Threat, Hazards, Governmental Homeland Security Structures, Intelligence, Counterterrorism, Border Security, Immigration, Customs Enforcement, Transportation Safety, Transportation Security, Cybersecurity, Critical Infrastructure Protection, Hazards Emergency Response, Hazards Emergency Recovery, Mitigation, Prevention, Preparedness, Communications, Science, Technology

Urban Violence and Security

Author: Adedoyin Adedayo

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: PCR362

Topics: Urban Violence, urban Security, Urbanisation, Urban Problems, Urban Transportation System, Urban Centres, urban Planning, conflict, Violent Conflict, Understanding Conflict, Conflict Management Strategies, Security, Human Security, Cooperative Security Efforts, insecurity management

Lecture notes on Computer Systems Security

Author: CSC FUTO

School: Federal University of Technology, Owerri

Department: Science and Technology

Course Code: CSC303

Topics: Computer Systems Security, CIA triad, Computer security threats, virus, botnet, Rootkit, keylogger, Computer Security Practices

Information Security Principles and Practice, 2nd Edition

Author: Mark Stamp

School: Edo University

Department: Science and Technology

Course Code: CMP318

Topics: information security, cryptography, access control, crypto, Codebook Cipher, Symmetric Key Crypto, block ciphers, Public Key Crypto, Elliptic Curve Cryptography, public key notation, Public Key Infrastructure, has functions, Advanced Cryptanalysis, Engima, Enigma Cipher Machine, authentication, biometrics, authorization, Access Control Matrix, Multilevel Security Models, firewalls, Intrusion Detection Systems, Simple Authentication Protocols, Authentication Protocols, Real-World Security Protocols, software flaws, malware, botnet, Digital Rights Management, Operating Systems, Operating Systems functions, Trusted Operating System

Departments

Administration, Social and Management science image

Administration, Social and Management science

Agriculture and Veterinary Medicine image

Agriculture and Veterinary Medicine

Arts and Humanities image

Arts and Humanities

Education image

Education

Engineering image

Engineering

General studies image

General studies

Law image

Law

Medical, Pharmaceutical and Health science image

Medical, Pharmaceutical and Health science

Science and Technology image

Science and Technology