Cybercrime and Forensic Investigation by Macpherson Uchenna Nnam PDF free download

Macpherson Uchenna Nnam Cybercrime and Forensic Investigation PDF, was published in 2008 and uploaded for 800-level Administration, Social and Management science students of National Open University of Nigeria (NOUN), offering CSS810 course. This ebook can be downloaded for FREE online on this page.

Cybercrime and Forensic Investigation ebook can be used to learn Cybercrime, Forensic Investigation, Control of Cybercrime, Prevention of Cybercrime, Space Transition Theory, Rational Choice Theory, Routine Activities Theory, Social Learning Theory, Fraud Triangle Theory, Cybersecurity Strategies, Computer Forensics, computer Forensic Investigation, Digital Forensic Investigation.

Technical Details
Updated at:
Size: 1.86 MB
Number of points needed for download: 15
Number of downloads: 6

Books related to Cybercrime and Forensic Investigation

Cybercrimes

Author: Philip Ndubueze

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS812

Topics: Cybercrime, Cyber Criminology, Child Pornography, Child Grooming, Cyberbullying, Cyberstalking, Cyber Squating, Dark Web, Cryptomarket Operations, Digital Piracy, Hacking, Malware, Online Advance Fee Fraud, Online Identity Theft, Sexting, Revenge Pornography, Differential Association Theory, Routine Activity Theory, Neutralization Theory, Space Transition Theory of Cybercrime, Cybercrime Legislations, International Cybercrime Legislations, International Cybercrime regulations, Studying Cybercrime, Investigating Cybercrime, Digital Forensics, hird Party Policing Strategies, Cybercrime Investigation

Advanced Cybercrimes and Cyber Security

Author: Macpherson Uchenna Nnam

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS808

Topics: Cybercrime, Cyber Security, Cyber Criminality, Cybercriminals, Cyber Threats, Electronic Evidence, Cybercrime Investigation, Generating Electronic Evidence, Electronic Evidence Handling, Computer Forensics, Computer Forensics Investigation, Computer Forensics Investigation Tools, Anomie-Strain Theory, Differential Association Theory, Situational crime prevention perspective

Principles of Fraud Examination ,4th edition

Author: Joseph Wells

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CRD405, ACC407

Topics: SKIMMING, CASH LARCENY, BILLING SCHEMES, CHECK TAMPERING, PAYROLL SCHEMES, EXPENSE REIMBURSEMENT SCHEMES, REGISTER DISBURSEMENT SCHEMES, NONCASH ASSETS, CORRUPTION, ACCOUNTING PRINCIPLES, FRAUD, Fraud Examination, FINANCIAL STATEMENT FRAUD SCHEMES, EXTERNAL FRAUD SCHEMES, FRAUD RISK ASSESSMENT, CONDUCTING INVESTIGATIONS, WRITING REPORTS, INTERVIEWING WITNESSES, OCCUPATIONAL FRAUD, OCCUPATIONAL ABUSE

Cybersecurity Fundamentals

Author: Kutub Thakur, Al-Sakib Khan Pathan

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB102

Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard

Criminal Investigation ,12th edition

Author: Charles Swanson

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS755

Topics: Criminal Investigation, forensic science, Investigators, Investigative Process, Crime Scene, Physical Evidence, Interviewing, Interrogation, Field Notes, Reporting, Follow-Up Investigation, Investigative Resources, Crime Laboratory, Injury Investigations, Death Investigations, Sex-Related Offenses, Crimes against Children, Human Trafficking, Robbery, Burglary, Larceny, Theft, White-Collar Crime, Vehicle Thefts, Cybercrime, Agricultural Crimes, Wildlife Crimes, Environmental Crimes, Arson, Explosives Investigations, Recognition, Control, Investigation of Drug Abuse, Terrorism, Drug Abuse, Trial Process, Investigator as a Witness

Population ,13th edition

Author: John Weeks

School: University of Ibadan

Department: Administration, Social and Management science

Course Code: SOC104

Topics: Population, demography, Demographic Data, Applied Demography, population force, Health, Mortality Transition, Fertility Transition, Migration Transition, Urban Transition, Age Transition, Life Course, Family Demograph, Life Chances, Environment, Global Sustainability

Criminology Theories, Patterns, and Typologies ,12th edition

Author: Larry Siegel

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS354, CSS411, CSS462

Topics: Criminology, Crime, Victims, Victimization, Rational Choice Theory, Trait Theories, Social Structure Theories, Socialization, Society, Social Conflict, Critical Criminology, Restorative Justice, CRIME TYPOLOGIES, Interpersonal Violence, Political Crime, Terrorism, Property Crime, Enterprise Crime, public Order Crime, Sex, Substance Abuse, Cybercrime, Transnational Organized Crime

The mind of the strategist the art of Japanese business

Author: Kenichi Ohmae

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: INR322

Topics: Japanese business, Routes to Strategic Advantage, Pursuing Aggressive Initiatives, Strategic Vision, Strategic Triangle, Customer-Based Strategies, Corporate-Based Strategies, Competitor-Based Strategies, Corporate Strategy, Building Successful Strategies, Modern Strategic Realities, Strategic Realities

Social Learning Theory

Author: Albert Bandura

School: University of Ibadan

Department: Administration, Social and Management science

Course Code: PSY205

Topics: Social Learning Theory, Social Learning, behavior, antecedent determinants, dysfunctional expectancy learning, corrective learning, consequent determinants, self-reinforcement, cognitive control, reciprocal determinism, reciprocal influence, self-direction

Learning Process

Author: SA Okhakhume

School: University of Ibadan

Department: Administration, Social and Management science

Course Code: PSY201

Topics: Learning Process, learning, Classical Conditioning, Classical Conditioning Processes, Operant Conditioning, Social Learning Theory, Latent Learning Theory, Insight Learning Theory, Human Memory, memory process, thinking, Thinking Process, language development

Cyber criminology and vulnerabilities

Author: Philip Ndubueze, Dickson Ogbonnaya Igwe

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS852

Topics: Cyber criminology, Cyber vulnerabilities, Cyber Crime, Cyberspace Threats, Cyberspace Vulnerabilities, Cyber Victimization, Profiling Cybercrime Offenders, Profiling Cybercrime Victims, Cyber Crime Legislations, Cyber Security Strategies

Applications of Computer in Business

Author: Gerald Okeke

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: SMS208, CIT202

Topics: computer applications, computer hardware, computer software, computer operations, operating systems, Computer Application Systems, Database Management System, Systems Development Life Cycle, computer networks, internet, computer security, Information Communication Technology, Processing Devices, storage, input Devices output Devices

International Marketing

Author: Gana

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: MKT825

Topics: International Marketing, international trade, World market environment, International marketing, branding, packaging, Market Share Strategies, Product strategies, Distribution strategies, Pricing strategies, International services, Marketing communication, world market, Economic Strategies, International organizations, International accounting, International marketing research

Digital culture, 2nd edition

Author: Charlie Gere

School: Edo University

Department: Administration, Social and Management science

Course Code: MAC222

Topics: Digital culture, cybernetic era, digital avant-garde, digital counter-culture, digital resistance, digital nature

Safety Management for Loss Prevention

Author: RA Okunola

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS342

Topics: Safety Management, Loss Prevention, Safety Culture, Understanding Safety, risk, Human Error, Aviation Safety, Risk Management, Safety, Security, Building Maintenance, Building Deterioration Phenomena, defective Buildings, Collapse of Buildings, Urban Crime Prevention Strategies

Cases Materials on Criminal Law ,Fourth Edition

Author: Mike Molan

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS136

Topics: Criminal Law, Actus reus, Interpreting criminal statutes, Criminal appeals, criminal liability, Mens rea, Transferred malice, Strict liability, Homicide, Causation, murder, Voluntary manslaughter, manslaughter, Involuntary manslaughter, unlawful act manslaughter, Corporate manslaughter, Poisoning, Common assault, battery, Stalking, Racially motivated assaults, harassment, Sexual offences, rape, Sexual assault, Accessorial liability, Inchoate offences, Statutory conspiracy, theft, fraud, Fraud Act 2006, Robbery, blackmail, burglary, Aggravated burglary, Criminal damage, automatism, intoxication, compulsion, Duress per minas, Duress, Self-defence

Introduction to Homeland Security ,4th edition

Author: Jane Bullock, George Haddow, Damon Coppola

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS245, CSS744

Topics: Homeland Security, Terrorist Threat, Hazards, Governmental Homeland Security Structures, Intelligence, Counterterrorism, Border Security, Immigration, Customs Enforcement, Transportation Safety, Transportation Security, Cybersecurity, Critical Infrastructure Protection, Hazards Emergency Response, Hazards Emergency Recovery, Mitigation, Prevention, Preparedness, Communications, Science, Technology

Guide to Computer Network Security, 4th edition

Author: Joseph Migga Kizza

School: University of Ilorin

Department: Engineering

Course Code: ICS308, TCS407, TCS408

Topics: computer network, computer network security, security threats, Computer Network Vulnerabilities, cyber crimes, hackers, scripting, web workers, security assessment, security analysis, security assurance, disaster management, access control, authorization, authentication, cryptography, firewall, intrusion detection, intrusion prevention, computer forensics, network forensics, virus filtering, content filtering, computer network security protocol, wireless networks, wireless devices, sensor network, Virtualization Technology, Virtualization security, cloud computing, cloud computing security, mobile systems, Internet of Things

Triangles of the Neck (Cervical triangles)

Author: Akinola

School: University of Ilorin

Department: Medical, Pharmaceutical and Health science

Course Code: ANA302

Topics: Cervical triangles, Submental Triangle, Muscular triangle, Carotid triangle, Digastric triangle, Posterior Triangle, Occipital triangle, Subclavian triangle

Social work treatment ,6th edition

Author: Francis Turner

School: University of Ibadan

Department: Administration, Social and Management science

Course Code: SOW101

Topics: Social work treatment, Social work, Attachment Theory, chaos theory, Client-Centered Theory, Cognitive Behavior Theory, Cognitive Theory, Constructivism, Ecopsychology, Existential Social Work, feminist theory, Gestalt Theory, Hypnosis, Clinical Social Work Practice, meditation, mindfulness, Neurolinguistic Programming Theory, Oppression Theory, Relational Social Work, relational theory, Socially Constructing Social Work, Task-Centered Social Work, Social Learning Theory

Past Questions related to Cybercrime and Forensic Investigation

Forensic Accounting and Fraud management II

Year: 2021

School: Air Force Institute of Technology

Department: Administration, Social and Management science

Course Code: ACC316

Topics: Fraud examination, Fraud theory, Forensic accounting

Agricultural extension teaching and learning process 2017, 2019, 2020

Year: 2020

School: Federal University of Technology, Owerri

Department: Agriculture and Veterinary Medicine

Course Code: AEX407

Topics: Extension teaching method, teaching, extension education, learning facilitation, group learning, motivation theories, motive, motivation, effective teaching, association learning, rote learning, over learning, sensation learning, information over load, extrinsic motivation, intrinsic motivation

Essentials of Strategic Management The Quest for Competitive Advantage test bank by John E Gamble,Margaret Peteraf,Arthur Thompson

Year: 2015

School: Modibbo Adama University of Technology

Department: Administration, Social and Management science

Course Code: MM403, MM401

Topics: Strategy, Business Models, Competitive Advantage, Charting a Company's Direction, Company External Environment, Company Resources, Company Capabilities, Company Competitiveness, Five Generic Competitive Strategies, Competitive Strategy, company Competitive position, Corporate Strategy, Diversification, Multibusiness Company, ethics, Corporate Social Responsibility, Environmental Sustainability, Strategy, Superior Strategy Execution

Introduction to business

Year: 2020

School: Nnamdi Azikiwe University

Department: Administration, Social and Management science

Course Code: BUS102

Topics: social responsibility, corporate social responsibility, McGregor's theory, Herzberg's theory, international trade, trade unions, insurance, employers association, life assurance

Control engineering 1

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: MCE401

Topics: Control engineering, open loop control system, closed loop control system, close loop transfer function, feedback control system, transfer function, open-loop transfer function, root locus, stability, analog computer, digital computer, analog computing, digital computing, analog signals, ODE linear, linear first-order differential equation, DC bias voltage, DC bias circuit, Emitter-stabilized bias circuit

NETWORK TOPOLOGY 1

Year: 2019

School: Federal University of Technology, Owerri

Department: Science and Technology

Course Code: MTH403

Topics: topology, set, topological space, metric space, open function, discrete topology, discrete space, subspace topology, topological space

Metric Space Topology Continuous Assessment

Year: 2019

School: University of Nigeria, Nsukka

Department: Science and Technology

Course Code: MTH321

Topics: Metric Space Topology, metric space, discrete metric space, Lipschitz function, Contraction Mapping Principle, nonempty set, set

Extension education and psychology 2018&2020

Year: 2020

School: Federal University of Technology, Owerri

Department: Agriculture and Veterinary Medicine

Course Code: AEX403

Topics: Agricultural extension process, educational psychology, education extension, extension service, social psychology, development psychology, personality psychology, biopsychology, social intelligence, concrete intelligence, motor intelligence, crystallized intelligence, learning experience, learning process, evaluation process

Chemical process control and dynamics

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: CHE501

Topics: Chemical process control, chemical dynamics, system stability, open loop transfer function, Bode plot, root locus plot, controller tuning, Ziegler-Nichols settings, Tyreus-Luyben settings, state space analysis, state equation, state-transition matric, state vector

Control system design technology

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: EEE501

Topics: Control system design technology, PID control equation, feedback control, PID algorithm, digital control design, sampling, discrete time response, zero-order hold model, Z transform, describing function, nonlinear difference equation, linear oscillation, absolute stability, linear systems, non-linear systems, nonlinear system analysis

Industrial ventilation and pollution control systems

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: ARE507

Topics: Industrial ventilation, pollution control systems, pollutant, pollution, pollution prevention, exfiltration, infiltration, indoor air pollution, ventilation, natural ventilation, local exhaust ventilation, cross flow ventilation, mechanical ventilation, single sided ventilation, dilution ventilation, industrial ventilation, adsorption, absorption, thermal oxidation, catalytic oxidation

Special topics in electronic and computer engineering option

Year: 2019

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: ECE512

Topics: Computer engineering, smart card chips, smart cards applications, smart card payment solutions, cybersecurity, cybercrimes, cyberattacks, RFID technology, bar cods, DDos attack, ransome ware, big data analytics, data warehousing, cloud-based services

Theory of instrumentation and measurement

Year: 2019

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: ECE302

Topics: instrumentation, measurement, instrument hysteresis thermocouple cathode ray oscilloscope, ramp-type digital voltmeter, digital multi-meter, bucking current, quiescent current, digital voltmeters

Principles of electronic communication

Year: 2019

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: COE318

Topics: Electronic communication, digital signal, analogue signal, digital modulation, analogue modulation, Shannon limit, ASK techniques, signal quantization, digital modulation techniques, bit rate, Nyquist sampling theorem, modulation index, radio wave propagation, radiation pattern, antenna efficiency, wave, antenna parameter