
- English
- PDF
- Available on iOS & Android
Internet Technologies and Cybersecurity Law in Nigeria
About this book
The focus here is Nigeria and cybercrimes, cybersecurity threats and response, cyber education and general cyberworkings in the cyber world that we all are part of, because living in a digitally- inclusive world has made our personal information vulnerable to hackers, governments, advertisers and, indeed, everyone. In an increasingly interconnected world, where the digital realm intertwines with every facet of our lives, the significance of cybersecurity cannot be overstated. This book, which focuses on cybercrimes, cybersecurity threats, and response, cyber education and, general workings in the cyber world, depicts how technology has not only ushered in unprecedented opportunities but also exposed the world to new and evolving threats that transcend borders and boundaries. - Hon. (Justice) Alaba Omolaye-Ajileye (Rtd), Visiting Professor, National Open University of Nigeria HQ. Jabi-Abuja FCT, Nigeria.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Front cover
- Title page
- Copyright
- Preface
- Foreword
- Abbreviations and Acronyms
- Table of Cases
- Table of Laws
- Contents
- Chapter 1 INTRODUCTION TO INTERNET
- Chapter 2 INTRODUCTION TO CYBERSECURITY
- Chapter 3 CYBERSECURITY THREATS
- Chapter 4 TYPES OF CYBERCRIME
- Chapter 5 OTHER ACTS OF CYBER THREAT
- Chapter 6 CYBERSECURITY TOOLS AND DATA PROTECTION
- Chapter 7 CYBERCRIME INVESTIGATION AND EVIDENCE
- Chapter 8 LEGAL FRAMEWORK AND POLICIES
- Chapter 9 CYBER VIOLENCE AGAINST WOMEN IN NIGERIA
- Chapter 10 DIVERSITY, EQUITY AND INCLUSION IN TECHNOLOGY
- Chapter 1 1 PROACTIVE CYBERSECURITY STRATEGIES
- Back cover