E-LIBRARY

Cybersecurity in Nigeria: Law, Policy, and Regulation 

Cybersecurity in Nigeria is governed by a mix of laws, policies, and regulatory frameworks aimed at protecting individuals, businesses, and government institutions from cyber threats. Here’s an overview of key aspects.

Open Source Intelligence Techniques 

I am delighted to share the latest version of our OSINT Tools and Resources Handbook. This version is almost three times the size of the last public release in 2016. It reflects the changing intelligence needs of our clients in both the public and private sector, as well as the many areas we have been […]

Network Security Essentials

Kevin Daimi received his Ph.D. from the University of Cranfield, England. He has a long mixture of academia and industry experience. His industry expe- rience includes working as senior programmer/sys- tems analyst, computer specialist, and computer con- sultant. He is currently professor and director of computer science and software engineering programs at the University of […]

The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security 

In today’s digital age, organizations have harnessed unprecedented connectivity and technological advancements, leading to enhanced efficiency and productivity. However, this progress has also exposed businesses to a multitude of cyber threats, including data breaches, ransomware attacks, and social engineering exploits. This research explores the relationship between organizational culture and cybersecurity practices, emphasizing the importance of […]

Hacker Techniques, Tools, and Incident Handling 

This text is part of the Information Systems Security & Assurance Series from Jones & Bartlett Learning (www.jblearning.com). Designed for courses and curricula in IT security, cybersecurity, information assurance, and information systems security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver […]

Cybersecurity Essentials 

This is not your typical security book. Other books of this genre exist to prepare you for certification or to teach you how to use a tool, but none explains the concepts behind the security threats impacting enterprises every day in a manner and format conducive to quick understanding. It is similar to a reference […]

Cybercrime and Digital Security in Nigeria 

Over the years, the alarming growth of the internet and its wide acceptance has led to increase in security threats. In Nigeria to- day, several internet assisted crimes known as cybercrimes are committed daily in various forms such as fraudulent electronic mails, pornography, identity theft, hacking, cyber harassment, spamming, Automated Teller Machine spoofing, piracy and […]

The Art of Deception

This book contains a wealth of information about information security and social engineering. To help you find your way, here’s a quick look at how this book is organized: In Part 1 I’ll reveal security’s weakest link and show you why you and your company are at risk from social engineering attacks.

Effective Security Management 

Karim H. Vellani is the President of Threat Analysis Group, LLC. Karim is a Board- Certi ed Protection Professional (CPP), a Board Certi ed Security Consultant (CSC), and has over 25 years of security management experience. He holds a master’s degree in Criminal Justice Management from Sam Houston State University in Huntsville, Texas. As an […]