Books related to Communication engineering studio 2
Software Engineering, Tenth Edition
Author: Ian sommerville
School: Federal University of Technology, Owerri
Department: Engineering
Course Code: MCE303, MCE506
Topics: software processes, agile software development, requirements engineering, system modelling, architectural design, design and implementation, software testing, software evolution, system dependability, system security, dependable systems, reliability engineering, safety engineering, security engineering, resilience engineering, advanced software engineering, software reuse, component-based software engineering, distributed software engineering, service-oriented software engineering, systems engineering, systems of systems, real-time software engineering, software management, project management, project planning, quality management, configuration management
Concise Guide to Software Engineering
Author: Gerard O'Regan
School: Federal University of Technology, Owerri
Department: Engineering
Course Code: MCE303, MCE506
Topics: Software Project Management, Requirements Engineering, Software Design, Software Development, Configuration Management, Software Inspections, Software Testing, Supplier Selection, Supplier Management, Software Quality Assurance, Software Metrics, Problem-Solving, Software Reliability, Software Dependability, formal methods, formal specification language, unified modelling language, software process improvement, capability maturity model integration, software engineering tools, agile methodology, miscellany of innovation
Cybersecurity Fundamentals
Author: Kutub Thakur, Al-Sakib Khan Pathan
School: Air Force Institute of Technology
Department: Science and Technology
Course Code: CYB102
Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard
Guide to Computer Network Security, 4th edition
Author: Joseph Migga Kizza
School: University of Ilorin
Department: Engineering
Course Code: ICS308, TCS407, TCS408
Topics: computer network, computer network security, security threats, Computer Network Vulnerabilities, cyber crimes, hackers, scripting, web workers, security assessment, security analysis, security assurance, disaster management, access control, authorization, authentication, cryptography, firewall, intrusion detection, intrusion prevention, computer forensics, network forensics, virus filtering, content filtering, computer network security protocol, wireless networks, wireless devices, sensor network, Virtualization Technology, Virtualization security, cloud computing, cloud computing security, mobile systems, Internet of Things
Power System Engineering Planning, Design, and Operation of Power Systems and Equipment ,2nd edition
Author: Juergen Schlabbach, Karl-Heinz Rofalski
School: Federal University of Technology, Owerri
Department: Engineering
Course Code: PSE513
Topics: Power System Engineering, Power System Engineering planning, Power System Engineering design, power system load, load forecast, Low-Voltage Systems, power system planning principles, power system planning criteria, loss evaluation, energy losses, power losses, power system topology, Busbar Arrangements, Double Busbar Arrangement, transformers, Thermal Permissible Loading, cable systems, Permissible Current, overload lines, Flexible AC Transmission Systems, Parallel Compensation of Lines, Serial Compensation of Lines, Phase-Shifting Equipment, HVDC-Transmission, Converter Stations, Breakers, Reactors, Electrodes, Load-Flow Calculation, Short-Circuit Current Calculation, faults, disturbances, Overcurrent Protection, Impedance Protection, Differential Protection of Lines, Ground-Fault Protection, Buchholz Protection, Overvoltages, Insulation Coordination, Slow-Front Overvoltages, Fast-Front Overvoltages, Neutral Earthing, Residual Current Compensation
Contemporary security studies ,3rd edition
Author: Alan collins
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS381
Topics: realism, liberalism, historical materialism, peace studies, security studies, critical security studies, social constructivism, human security, gender and security, securitization, Military security, regime security, societal security, environmental security, economic security, globalization, development, security, traditional security, non-traditional security, coercive diplomacy, weapons of mass destruction, terrorism, humanitarion intervention, energy security, defence trade, health and security, transnational crime, cyber-security, child soldiers
Contemporary Security Studies, Third Edition
Author: Alan Collins
School: Obafemi Awolowo University
Department: Administration, Social and Management science
Course Code: IRS208
Topics: Contemporary Security Studies, realism, liberalism, historical materialism, peace studies, critical security studies, social constructivism, human security, gender, security, securitization, military security, regime security, societal security, environmental security, economic security, globalization, development, security, traditional security, non-traditional security, coercive diplomacy, weapons of mass destruction, terrorism, humanitarian intervention, energy security, defence trade, health and security, transnational crime, cyber security, child soldiers
Communication Systems Engineering, 2nd Edition
Author: John Proakis, Masoud Salehi
School: Edo University
Department: Engineering
Course Code: CPE312
Topics: Communication Systems Engineering, Electrical Communication System, Communication Channel, frequency domain analysis, Fourier series, Fourier transforms, Bandlimited Signals sampling, bandpass signals, analog signal transmission, modulation, amplitude modulation, Conventional Amplitude Modulation, angle modulation, radio broadcasting, television broadcasting, mobile radio systems, random processes, Gaussian Processes, White Processes, Bandlimited Processes, Bandpass Processes, Linear-Modulation Systems, information sources, source coding, source-coding theorem, Source-Coding Algorithms, Rate-Distortion Theory, quantization, Analysis-Synthesis Techniques, waveform coding, Digital Audio Transmission, Digital Audio Recording, Pulse Amplitude Modulation, Two-dimensional Signal Waveforms, Multidimensional Signal Waveforms, White Gaussian Noise, Symbol Synchronization, Bandlimited Channels, Digitally Modulated Signals, channel; capacity, channel coding, linear block code, cyclic codes, Convolutional Codes, wireless communications, Continuous Carrier-Phase Modulation, Spread-Spectrum Communication Systems, Digital Cellular Communication Systems
Security Planning, Development and Organization
Author: Darlington Ikpi
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS245
Topics: Security Planning, Company Business Interest, Security Planning, Security Development, Security Organization, Private Security Operation, Public Security, Private Security, Security Survey System, National Interest, Security Staff, Security Staff Supervisors, Patrol Procedures, Patrol Techniques, Loss Prevention, loss Control, Security Policy, Security Design, Security Procedures
McQuail's Mass Communication Theory ,6th edition
Author: Denis McQuail
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: JLS845, MAC113
Topics: Mass Communication Theory, Mass Communication, mass media, New Media, culture, Normative Theory of Media, Media Structure, media Performance, media freedom, media equality, media diversity, Media Economics, Global Mass Communication, Global media structure, Media Organization, media culture, media content, media genres, media texts, audiences, audience theory, research traditions, audience formation, media effects, social-cultural effects, public opinion, news, political communication
Principle of Construction
Author: Nasiru Danlami
School: Bayero University, Kano
Department: Engineering
Course Code: CIV3301
Topics: Civil Engineering Procedure, civil engineering, Structural Engineering, Environmental Engineering, Water Resources Engineering, Hydraulic Engineering, Geotechnical Engineering, Construction Engineering, Civil Engineering Design, Applied Civil Engineering Design, Civil Engineering Design Documents, construction process management, site analysis, Site reconnaissance, surveys, measured survey, condition survey, Photographic survey, video surveys, Site Investigation, Foundation design, subsoil examination, trial pits, borehole, Window samplers, Rotary Drilling Equipment, Percussion boring, construction principles, construction equipment, earthing moving equipment, bulldozer, Frontend Loader, Motor Graders, scrapers, truck, Excavating Equipment, construction elements, Foundation construction, foundation types, Strip foundations, Wide strip foundation, Short-bored pile foundations, Pad foundations, Raft foundations
Advertising, promotion and other spects of integrated marketing communications ,10th Edition
Author: Terence Shimp, Craig Andrews
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: MAC331
Topics: Advertising, promotion, integrated marketing communications, Brand
Equity, brand Accountability, Brand Adoption, Brand Naming, Intellectual Property, integrated marketing communications planning, Segmentation, Targeting, Positioning, Communications Process, Consumer Behavior, Objective Setting, persuasion, Advertising Management, Media Choices, Effective Ad Messages, Creative Ad Messages, Traditional Advertising Media, Advertising Media, digital media, Online Advertising, Mobile Advertising, App Advertising, social media, Direct Marketing, Media Planning, media Analysis, Sales Promotion, trade promotion, Sales Promotion, Consumer Sales Promotion, Public Relations, Content Marketing, Viral Marketing, Sponsorships, Packaging, Point-of-Purchase Communications, Signage, personal selling
Solutions manual Communication Systems Engineering, 2nd edition
Author: John Proakis, Masoud Salehi, Evangelos Zervas
School: Edo University
Department: Engineering
Course Code: CPE312
Topics: Communication Systems Engineering, frequency domain analysis, analog signal transmission, analog signal reception, random processes, white Gaussian noise channel, digital transmission, channel capacity, channel coding, wireless communications
Principles of Mobile Communication, 4th edition
Author: Gordon Stüber
School: University of Ilorin
Department: Engineering
Course Code: ELE511, COE407
Topics: cellular systems, wireless systems, wireless standards, propagation modeling, co-channel interference, modulation, power spectrum, error probability, multi-antenna techniques, MIMO, Time domain equalization, interference calculation, error control coding, spread spectrum techniques, multi-carrier techniques, frequency planning techniques, CDMA cellular systems, channel assignment techniques
Information System Security Management
Author: AD Ikuomola
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS343
Topics: Information System Security Management, Information gathering, Information security, system analysis, system design, Information system security, information security integration, information communication technology, information assurance, information systems usability, business security, Risk assessment, Risk mitigation options, Mitigating economic risk, Information age militaries, Information technology impacts, information security investment
Public and Private Security Partnership
Author: Moses Ikoh
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS807
Topics: Public and Private Security Partnership, Public-Private Security, Liberalization of Security, Public-Private Partnerships for Security, Security cooperation, Inclusive Security, National Security, Value of Security, Community Security, Social Cohesion, Security partnership, Security collaborations, Critical Security Targets
Data Communications and Networking ,4th edition
Author: Behrouz Forouzan, Sophia Chung Fegan
School: National Open University of Nigeria
Department: Science and Technology
Course Code: CIT891
Topics: Data Communications, Networking, data, signals, digital transmission, analog transmission, bandwidth utilization, transmission media, switching, data link layer, error detection, error correction, data link control, multiple access, wireless LAN, ethernet, SONET, SDH, virtual-circuit networks, frame relay, network layer, logical addressing, internet protocol, address mapping, error reporting, multicasting, transport layer, domain name system, remote logging, electronic mail, file transfer, HTTP, network management, SNMP, multimedia, cryptography, network security
Effective Security Management ,Seventh Edition
Author: Charles Sennewald, Curtis Baillie
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS245, CSS744
Topics: security management, Organizational structure, security director’s role, security supervisor’s role, individual security employee, Ethics, conflicts of interest, Security personnel management, Hiring security personnel, Discipline, Promotions, Communication, Operational management, Planning, budgeting, Program management, Problem solving, risk, Crisis management, security survey, International security standards, Office administration, Written policies, Written procedures, effective security management, security management tool, security management, Community relations, Mismanagement, Jackass management traits
Legal and Social Framework of Private Security Services in Nigeria
Author: Niyi Adegoke
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS246
Topics: Security, Private Security, Private Security Sector, Private Security Company, Risk Analysis, Security Survey, Private Security Service, Information Security, Nigerian Security and Civil Defence Corps, Security threat
Information Technology
Author: OO Folorunso
School: University of Ibadan
Department: Education
Course Code: LIS103
Topics: Information Technology, Data Communication Systems, Transmitted Signal, modulation, demodulation, Transmission Media, data transmission techniques, Transmission Techniques, transmission, data traffic control, polling, handshaking, multiplexing, Data Communication Networks, Network system, Multi-user system, Inter-nodal Connection, Network Topology, Information Technology Services, desktop publishing, internet, Web Browsers, Search Engines, Net Surfing, Internet Addressing System, internet services, Domain Name Service, file transfer protocol