Books

Search Books...

Trojan Horses Books

Information technology in engineering

Author: ENG

School: Chukwuemeka Odumegwu Ojukwu University

Department: Engineering

Course Code: ENG106

Topics: Information technology, Computer skills, Computer Components, Hardware, Malicious Software, Worms, Trojan horses

Computer networks and security

Author: CPE FUOYE

School: Federal University, Oye-Ekiti

Department: Engineering

Course Code: CPE101

Topics: Computer networks, computer security, Personal Area Network, local area network, Campus Area Network, Metropolitan Area Network, internetwork, intranet, extranet, internet, Network Interface Cards, router, malware, computer virus, trojan horses, logic bombs, spyware, worms, firewall, anti-virus

Introduction to information and communication technology

Author: GST FUOYE

School: Federal University, Oye-Ekiti

Department: General studies

Course Code: GST103

Topics: communication, information and communication technology, computer threats, malicious code, virus, trojan horse, logic bomb, worm, antivirus, network

The Iliad (Penguin Classics Deluxe Edition)

Author: Homer, Robert fagles, Bernard Knox

School: University of Ibadan

Department: Arts and Humanities

Course Code: CLC101

Topics: Achilles, Diornedes, hector, troy, ajax, Agamemnon, trojan, hera, zeus, Achaean army, Patroclus, Menelaus, Olympian Gods, Priam, Greek literature

Development of The Heart

Author: Dr. J.O Ezugworie

School: University of Nigeria, Nsukka

Department: Medical, Pharmaceutical and Health science

Course Code: ANAT

Topics: Formation of horseshoe-shaped endothelial lined tube, Formation and position of heart tube, Formation of cardiac looping, embryonic nutrition, lateral plate mesoderm, primary heart field PHF ? cardiogenic region, splanchnic mesoderm

Modern Livestock and Poultry Production, 9th Edition

Author: Frank Flanders, James Gillespie

School: National Open University of Nigeria

Department: Agriculture and Veterinary Medicine

Course Code: ANP313

Topics: Livestock Production, Poultry Production, domestication, livestock industry, livestock production safety, nutrition, feeding, feed nutrients, feed additives, balancing rations, animal breeding, animal breeding genetics, animal reproduction, animal breeding systems, Beef cattle, marketing beef cattle, swine, feeding wine, swine housing, swine equipment, marketing swine, sheep, goats, sheep feeding, sheep management, horses, horsemanship, horse training, poultry, poultry diseases, poultry parasites, marketing poultry, marketing eggs, dairy cattle, dairy cattle breeds, feeding dairy cattle, dairy herd management, milking management, dairy heard health, dairy housing equipment, marketing milk, rabbits, Bison, ratites, Llamas, Alpacas, Elk

Cybersecurity Fundamentals

Author: Kutub Thakur, Al-Sakib Khan Pathan

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB102

Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard

Departments

Administration, Social and Management science image

Administration, Social and Management science

Agriculture and Veterinary Medicine image

Agriculture and Veterinary Medicine

Arts and Humanities image

Arts and Humanities

Education image

Education

Engineering image

Engineering

General studies image

General studies

Law image

Law

Medical, Pharmaceutical and Health science image

Medical, Pharmaceutical and Health science

Science and Technology image

Science and Technology