LIST OF BOOKS ON CYBER SECURITY PROGRAMME APRIL, 2021 | ||||||
S/N | AUTHOR | TITLE | CLASS MARK | COPY | YEAR | |
1 | Pressman, S. Roger (et…al) | Software Engineering: A Practioners Approach | QA76.6 | 2 | 2020 | |
2 | Forouzan, A. Behrouz (et…al) | C t t Programming: An object oriented Approach | QA76.64.F67 | 1 | 2020 | |
3 | Gai, Silvano | Building a Future – Prof. Cloud Infrastructure: A Unified achitecture for Tetwork, Security and Storage Services | QA76.7.G35 | 2 | 2020 | |
4 | Kenneth Lambart | Fundamentals of Python Data structures | QA76.73.L36 | 1 | 2019 | |
5 | Kothari, C. R. (et…al) | Research Methodology: Methods and techniques | Q180.55.K68 | 1 | 2019 | |
6 | Dehghantanha, Ali (et…al) | Handbook of Big Data and loT Security | QA76.9.H36 | 1 | 2019 | |
7 | Augenbaum Scott E. | The Scret to Cyber Security | TK5105.5.A84 | 1 | 2019 | |
8 | Sikos, Leslie F. | Al in Cyber Security | TK5105.5.S55 | 1 | 2019 | |
9 | West Jill (et…al) | Network + Guide to Networks 7th ed. | TK5105.W48 | 1 | 2018 | |
10 | Nagrath I. J. (et…al) | Control systems engineering | TJ213.N256 | 1 | 2018 | |
11 | William Stellings | Operating Systems | QA76.76.S72 | 2 | 2018 | |
12 | Kenneth S. Borders | Research Design and Methods | BF76.5.B67 | 1 | 2018 | |
13 | Paul Deitel | Java how to programm Early objectives | QA76.73.D45 | 1 | 2018 | |
14 | Bramwell Phil | Hands-On Penetration Testing on Windows | TK5105.5.B73 | 1 | 2018 | |
15 | Dehghantanha, Ali (et…al) | Cyber Threat Intelligence | QA76.9.C93 | 1 | 2018 | |
16 | Zhang, Yinkg | Network Function Virtualization: Concepts and Applicability in 5G Networks | TK5105.5.Z34 | 1 | 2018 | |
17 | Teixeira, Daniel (et…al) | Metasploit Penetration Testing: Cook Book 3rd ed. | TK5105.59.T45 | 1 | 2018 | |
18 | Andrews Jean (et…al) | A Guide to Hardware: Managing Maintaining and Troubleshooting 9th ed. | TK7887.A54 | 1 | 2017 | |
19 | Jean Andrews | A Guide to IT technical suport | TK5105.8.A54 | 1 | 2017 | |
20 | Schulz, Greg | Software-Defined Data Infrastructure Essentials | TK5105.5.S38 | 1 | 2017 | |
21 | Goransson Paul (et….al) | Software Defined Networks: A Comprehensive Approach 2nd ed. | TK5105.58.G67 | 1 | 2017 | |
22 | Copeland Marshall | Cyber Security on Azure | TK5109.59.C67 | 1 | 2017 | |
23 | Kizza, Joseph Migga | Guide to Computer Network Security. 4th ed. | TK5105.5.K59 | 1 | 2017 | |
24 | Sommervive, Lan | Software Engineering | QA 76.6 .S86 | 1 | 2016 | |
25 | Ashish, Bhat nagar | PC Upgrading Maintainance and trouble shooting Guide | QA76.3 .B43 | 2 | 2016 | |
26 | Phil Williams | Cyber Space | HM221.W55 | 1 | 2016 | |
27 | Joyce Farrell | Visual C# 2015: An Introduction to object- oriented programming | QA76.64.F36 | 1 | 2016 | |
28 | Smart, Nigel P. | Cryptography Made Simple | TK510.2.94.S62 | 1 | 2016 | |
29 | Nelson L. S. da Fonseca | Cloud Services, Networking and Management | QA76.585 .F66 | 2 | 2015 | |
30 | Mark Ciampa | Security + Guide to Network Security Fundamentals | TK5105.C53 | 1 | 2015 | |
31 | Fariell | Programming logic and Design | QA76.73.F36 | 1 | 2015 | |
32 | Helbing Dink | Thinking Ahead: Essays on big data, digital revolution, and participatory market Society | QA76.8.H45 | 1 | 2015 | |
33 | Wieczorek, Martin (et…al) | System and Software Quality: The next step for Industrialization | QA76.75.W54 | 2 | 2014 | |
34 | Mishra. K.L.P | Theory of computer Science | QA76.M57 | 2 | 2012 | |
35 | Monojit | Satelite Communication | TL694.A6 | 1 | 2012 | |
36 | Wayman James | Introduction to Biometrics | TK7882.B56.J35 | 1 | 2011 | |
37 | Vikas Gupta | Secret Guide to Hardware and Networking | TK510.5.G87 | 3 | 2010 | |
38 | Shelly Rosenblett | System Analysis and Design | QA402.S44 | 1 | 2010 | |
39 | Roy Choudhury | Network and System | TK5105.5.R59 | 1 | 2010 | |
40 | Chris Clark | Mobile Application Security | TK5102.85 .D88 | 1 | 2010 | |
41 | Greegory Peter | CISA Certified Information Systems Auditor: Exam Guide | QA76.9.G73 | 1 | 2010 | |
42 | Behrouz A. Forouzan | Cryptography and Network Security | TK5105.59 .B34 | 1 | 2008 | |
43 | Oliver, P. R. M & Kanataris | Using PDF files | QA76.8.G45 | 2 | 2005 | |
44 | Gbenga Ajugu | Website Designer | TK5105.888.G23 | 1 | 2005 | |
45 | Stallings,William | Data and Computer Communication | TK5105 .S73 | 1 | 2004 | |
46 | Comer Douglas | Hands on Networking with Internet Technologies | TK5105.5 .C59 | 1 | 2004 | |
47 | Brijendre Singh | Data Communication and Computer Networks | TK5105.5 .B75 | 2 | 2004 | |
48 | Stallings,William | Cryptography and Network Security | TK5105.59 .S713 | 1 | 2003 | |
49 | Panko,R.Raymond | Business data, network & telecommunication | QA76.8.P36 | 2 | 2003 | |
50 | Stallings,William | High-speed Networks & internets | QA75.S72 | 2 | 2002 | |
51 | Stallings,William | Wireless Communication & Networks | QA75.S72 | 2 | 2002 | |
52 | Salah Aidarous | Telecommunications Network Management | TK5102.5 .T3955 | 1 | 2002 | |
53 | Shari Lawrence | Software Engineering: Theory and Practice | QA76.6.S42 | 1 | 2001 | |
54 | Dodge Martin | Atlas Cyber Space | TK5105.59.D63 | 1 | 2001 | |
55 | CEM Kaner | Testing Computer Software | QA76.76.T48 K36 | 1 | 1993 | |
56 | Blach, Ulyess | Data communication & distributed networks | QA76.8.B52 | 2 | 1993 | |
57 | Blach, Ulyess | computer network protocol standard and interface | TK5105.55.B52 | 1 | 1993 |