Cryptography Books
Information Security Principles and Practice, 2nd Edition
Author: Mark Stamp
School: Edo University
Department: Science and Technology
Course Code: CMP318
Topics: information security, cryptography, access control, crypto, Codebook Cipher, Symmetric Key Crypto, block ciphers, Public Key Crypto, Elliptic Curve Cryptography, public key notation, Public Key Infrastructure, has functions, Advanced Cryptanalysis, Engima, Enigma Cipher Machine, authentication, biometrics, authorization, Access Control Matrix, Multilevel Security Models, firewalls, Intrusion Detection Systems, Simple Authentication Protocols, Authentication Protocols, Real-World Security Protocols, software flaws, malware, botnet, Digital Rights Management, Operating Systems, Operating Systems functions, Trusted Operating System
Operating System Concepts, 10th edition
Author: Abraham Silberschatz, Greg Gagne, Peter Galvin
School: Edo University
Department: Science and Technology
Course Code: CSC212
Topics: Operating System, Computer-System Organization, Computer-System Architecture, Operating-System Operations, Operating-System Structures, Operating-System Services, user interface, operating system interface, distributed systems, kernel data structures, Operating-System Debugging, process management, process scheduling, interprocess communication, Multicore Programming, Multithreading Models, Implicit Threading, CPU Scheduling, Multi-Processor Scheduling, Real-Time CPU Scheduling, Algorithm Evaluation, process synchronization, POSIX Synchronization, dead locks, memory management, Contiguous Memory Allocation, virtual memory, storage management, HDD Scheduling, NVM Scheduling, error detection, storage device management, RAID structure, file system, file-system interface, file-system implementation, file-system structure, file-system operations, directory implementation, Free-Space Management, File-System Internals, File-System Mounting, file sharing, virtual file systems, remote file systems, security, program threats, Cryptography, Role-Based Access Control, access matrix, virtual machines, networks, Distributed File Systems, remote file access, Linux system, Kernel Modules, programmer interface
Foundations of computer science
Author: Olufade Falade Williams Onifade
School: University of Ibadan
Department: Science and Technology
Course Code: CSC242
Topics: computer science, logic, sets, loops, recursion, Program Correctness, Loop invariant, Hoare’s Axiom, Discrete Probability, Randomized Algorithms, lists, graphs, Cryptography, Mathematical induction
Discrete mathematics and its applications ,8th edition
Author: Kenneth Rosen
School: University of Ibadan
Department: Science and Technology
Course Code: CSC242
Topics: Discrete mathematics, logic, sets, functions, sequences, matrices, algorithms, Number theory, cryptography, induction, recursion, counting, discrete probability, advanced counting techniques, counting techniques, Linear Recurrence Relations, modelling computation, Finite-State Machines, relations, graphs, trees, boolean algebra, modelling computation, Boolean Functions, Logic Gates, Minimization of Circuits.Tree Traversal, Spanning Trees, Minimum Spanning Trees, Graph Models, Graph Terminology, Graph Isomorphism, Connectivity, Euler path, Hamilton Path, Shortest-Path Problems, Planar Graphs, Graph Coloring, Representing Relations, Equivalence Relations, Probability Theory, Bayes Theorem, variance, Pigeonhole Principle, permutation combination, binomial coefficient, Recursive Algorithms, Program Correctness, Divisibility, Modular Arithmetic, Integer Representations, Set Operations, Cardinality of Sets
Author: Gregory Lee
School: University of Ilorin
Department: Science and Technology
Course Code: MAT306, MAT327
Topics: relations, set, set operation, integer, modular arithmetic, groups, factor groups, homomorphism, direct products, finite abelian groups, automorphism, morphism, symmetric group, alternating group, sylow theorem, rings, factor rings, isomorphism, domains, Irreducible Polynomials, vector spaces, field extensions, public key cryptography, straightedge, compass constructions
Guide to Computer Network Security, 4th edition
Author: Joseph Migga Kizza
School: University of Ilorin
Department: Engineering
Course Code: ICS308, TCS407, TCS408
Topics: computer network, computer network security, security threats, Computer Network Vulnerabilities, cyber crimes, hackers, scripting, web workers, security assessment, security analysis, security assurance, disaster management, access control, authorization, authentication, cryptography, firewall, intrusion detection, intrusion prevention, computer forensics, network forensics, virus filtering, content filtering, computer network security protocol, wireless networks, wireless devices, sensor network, Virtualization Technology, Virtualization security, cloud computing, cloud computing security, mobile systems, Internet of Things
Data Communications and Networking ,4th edition
Author: Behrouz Forouzan, Sophia Chung Fegan
School: National Open University of Nigeria
Department: Science and Technology
Course Code: CIT891
Topics: Data Communications, Networking, data, signals, digital transmission, analog transmission, bandwidth utilization, transmission media, switching, data link layer, error detection, error correction, data link control, multiple access, wireless LAN, ethernet, SONET, SDH, virtual-circuit networks, frame relay, network layer, logical addressing, internet protocol, address mapping, error reporting, multicasting, transport layer, domain name system, remote logging, electronic mail, file transfer, HTTP, network management, SNMP, multimedia, cryptography, network security
Departments
Administration, Social and Management science
Agriculture and Veterinary Medicine
Arts and Humanities
Education
Engineering
General studies
Law
Medical, Pharmaceutical and Health science
Science and Technology