Cybersecurity Books
Author: Kutub Thakur, Al-Sakib Khan Pathan
School: Air Force Institute of Technology
Department: Science and Technology
Course Code: CYB102
Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard
Introduction to Homeland Security ,4th edition
Author: Jane Bullock, George Haddow, Damon Coppola
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS245, CSS744
Topics: Homeland Security, Terrorist Threat, Hazards, Governmental Homeland Security Structures, Intelligence, Counterterrorism, Border Security, Immigration, Customs Enforcement, Transportation Safety, Transportation Security, Cybersecurity, Critical Infrastructure Protection, Hazards Emergency Response, Hazards Emergency Recovery, Mitigation, Prevention, Preparedness, Communications, Science, Technology
Cybercrime and Forensic Investigation
Author: Macpherson Uchenna Nnam
School: National Open University of Nigeria
Department: Administration, Social and Management science
Course Code: CSS810
Topics: Cybercrime, Forensic Investigation, Control of Cybercrime, Prevention of Cybercrime, Space Transition Theory, Rational Choice Theory, Routine Activities Theory, Social Learning Theory, Fraud Triangle Theory, Cybersecurity Strategies, Computer Forensics, computer Forensic Investigation, Digital Forensic Investigation
Departments
Administration, Social and Management science
Agriculture and Veterinary Medicine
Arts and Humanities
Education
Engineering
General studies
Law
Medical, Pharmaceutical and Health science
Science and Technology