Cyber Security (Record no. 6346)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 05888nam a22001937a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251225020010.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 240829b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9788126521791 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 004 |
| Item number | GOD |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Godbole, Nina |
| 245 ## - TITLE STATEMENT | |
| Title | Cyber Security |
| Remainder of title | : Understanding Cyber Crimes, Computer Forensics and Legal Perspectives |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc. | New Delhi |
| Name of publisher, distributor, etc. | Wiley India Pvt. Ltd |
| Date of publication, distribution, etc. | 2024 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Page No. | xlv, 570, i18 p |
| Dimensions | 24 x 18 cm |
| 500 ## - GENERAL NOTE | |
| General note | This book, focusing on cyberthreats and cybersecurity, provides the much needed awareness in the times of growing cybercrime episodes.<br/><br/>·Comprehensive treatment of important topic - cybersecurity to help readers understand the implications of cybercrime.<br/><br/>·The book provides adequate orientation on laws in reference to cybercrime and cybersecurity taking into account the Indian as well as global scenario.<br/><br/>·Awareness created through simple practical tips and tricks, educates readers to learn how to avoid becoming victims of cybercrime.<br/><br/>·Written by InfoSec domain SME and co-authored by qualified ethical hacking professional who is also a security certified.<br/><br/>·Well-presented case illustrations and examples from real life to underline the significance of topics addressed in each chapter |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Introduction to Cybercrime<br/><br/>Introduction<br/><br/>Cybercrime: Definition and Origins of the Word<br/><br/>Cybercrime and Information Security<br/><br/>Who are Cybercriminals?<br/><br/>Classifications of Cybercrimes<br/><br/>Cybercrime: The Legal Perspectives<br/><br/>Cybercrimes: An Indian Perspective<br/><br/>Cybercrime and the Indian ITA 2000<br/><br/>A Global Perspective on Cybercrimes<br/><br/>Cybercrime Era: Survival Mantra for the Netizens<br/><br/>Concluding Remarks and Way Forward to Further Chapters<br/><br/>Cyberoffenses: How Criminals Plan Them<br/><br/>Introduction<br/><br/>How Criminals Plan the Attacks<br/><br/>Social Engineering<br/><br/>Cyberstalking<br/><br/>Cybercafe and Cybercrimes<br/><br/>Botnets: The Fuel for Cybercrime<br/><br/>Attack Vector<br/><br/>Cloud Computing<br/><br/>Cybercrime: Mobile and Wireless Devices<br/><br/>Introduction<br/><br/>Proliferation of Mobile and Wireless Devices<br/><br/>Trends in Mobility<br/><br/>Credit Card Frauds in Mobile and Wireless Computing Era<br/><br/>Security Challenges Posed by Mobile Devices<br/><br/>Registry Settings for Mobile Devices<br/><br/>Authentication Service Security<br/><br/>Attacks on Mobile/Cell Phones<br/><br/>Mobile Devices: Security Implications for Organizations<br/><br/>Organizational Measures for Handling Mobile<br/><br/>Organizational Security Policies and Measures in Mobile Computing Era<br/><br/>Laptops<br/><br/>Tools and Methods Used in Cybercrime<br/><br/>Introduction<br/><br/>Proxy Servers and Anonymizers<br/><br/>Phishing<br/><br/>Password Cracking<br/><br/>Keyloggers and Spywares<br/><br/>Virus and Worms<br/><br/>Trojan Horses and Backdoors<br/><br/>Steganography<br/><br/>DoS and DDoS Attacks<br/><br/>SQL Injection<br/><br/>Buffer Overflow<br/><br/>Attacks on Wireless Networks<br/><br/>Phishing and Identity Theft<br/><br/>Introduction<br/><br/>Phishing<br/><br/>Identity Theft (ID Theft)<br/><br/>Cybercrimes and Cybersecurity: The Legal Perspectives<br/><br/>Introduction<br/><br/>Cybercrime and the Legal Landscape around the World<br/><br/>Why Do We Need Cyberlaws: The Indian Context<br/><br/>The Indian IT Act<br/><br/>Challenges to Indian Law and Cybercrime Scenario in India<br/><br/>Consequences of Not Addressing the Weakness in Information Technology Act<br/><br/>Digital Signatures and the Indian IT Act<br/><br/>Amendments to the Indian IT Act<br/><br/>Cybercrime and Punishment<br/><br/>Cyberlaw, Technology and Students: Indian Scenario<br/><br/>Understanding Computer Forensics<br/><br/>Introduction<br/><br/>Historical Background of Cyberforensics<br/><br/>Digital Forensics Science<br/><br/>The Need for Computer Forensics<br/><br/>Cyberforensics and Digital Evidence<br/><br/>Forensics Analysis of E-Mail<br/><br/>Digital Forensics Life Cycle<br/><br/>Chain of Custody Concept<br/><br/>Network Forensics<br/><br/>Approaching a Computer Forensics Investigation<br/><br/>Setting up a Computer Forensics Laboratory: Understanding the Requirements<br/><br/>Computer Forensics and Steganography<br/><br/>Relevance of the OSI 7 Layer Model to Computer Forensics<br/><br/>Forensics and Social Networking Sites: The Security/Privacy Threats<br/><br/>Computer Forensics from Compliance Perspective<br/><br/>Challenges in Computer Forensics<br/><br/>Special Tools and Techniques<br/><br/>Forensics Auditing<br/><br/>Antiforensics<br/><br/>Forensics of Hand-Held Devices<br/><br/>Introduction<br/><br/>Understanding Cell Phone Working Characteristics<br/><br/>Hand-Held Devices and Digital Forensics<br/><br/>Toolkits for Hand-Held Device Forensics<br/><br/>Forensics of iPods and Digital Music Devices<br/><br/>An Illustration on Real Life Use of Forensics<br/><br/>Techno-Legal Challenges with Evidence from Hand-Held Devices<br/><br/>Organizational Guidelines on Cell Phone Forensics<br/><br/>Cybersecurity: Organizational Implications<br/><br/>Introduction<br/><br/>Cost of Cybercrimes and IPR Issues: Lessons for Organizations<br/><br/>Web Threats for Organizations: The Evils and Perils<br/><br/>Security and Privacy Implications from Cloud Computing<br/><br/>Social Media Marketing: Security Risks and Perils for Organizations<br/><br/>Social Computing and the Associated Challenges for Organizations<br/><br/>Protecting Peoples Privacy in the Organization<br/><br/>Organizational Guidelines for Internet Usage, Safe Computing Guidelines and Computer Usage Policy<br/><br/>Incident Handling: An Essential Component of Cybersecurity<br/><br/>Forensics Best Practices for Organizations<br/><br/>Media and Asset Protection: Best Practices for Organizations<br/><br/>Importance of Endpoint Security in Organizations<br/><br/>Cybercrime and Cyberterrorism: Social, Political, Ethical and Psychological Dimensions<br/><br/>Introduction<br/><br/>Intellectual Property in the Cyberspace<br/><br/>The Ethical Dimension of Cybercrimes<br/><br/>The Psychology, Mindset and Skills of Hackers and Other Cybercriminals<br/><br/>Sociology of Cybercriminals<br/><br/>Information Warfare: Perception or An Eminent Reality?<br/><br/>Cybercrime: Illustrations, Examples and Mini-Cases<br/><br/>Introduction<br/><br/>Real-Life Examples<br/><br/>Mini-Cases<br/><br/>Illustrations of Financial Frauds in Cyber Domain<br/><br/>Digital Signature-Related Crime Scenarios<br/><br/>Digital Forensics Case Illustrations<br/><br/>Online Scams<br/><br/>Careers in Cybersecurity<br/><br/>Introduction<br/><br/>IT Security Organization<br/><br/>Career Paths in Cybersecurity<br/><br/>Cybersecurity Certifications<br/><br/>Guide Path<br/><br/>Index |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Belapure, Sunit |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Book Bank |
| Koha issues (borrowed), all copies | 8 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Date acquired | Currency | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Bill Date | Koha item type | Bill Number | Checked out | Date last checked out |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | DS (Data Science) | Raj Kumar Goel Institute of Technology | Raj Kumar Goel Institute of Technology | 29/08/2024 | ₹ | 1099.00 | 004 GOD | 94715 | 29/08/2024 | 29/08/2024 | Reference | BOS-000461 | |||||||
| Dewey Decimal Classification | DS (Data Science) | Raj Kumar Goel Institute of Technology | Raj Kumar Goel Institute of Technology | 29/08/2024 | ₹ | 1099.00 | 004 GOD | 94716 | 29/08/2024 | 29/08/2024 | Reference | BOS-000461 | |||||||
| Dewey Decimal Classification | DS (Data Science) | Raj Kumar Goel Institute of Technology | Raj Kumar Goel Institute of Technology | 29/08/2024 | ₹ | 1099.00 | 004 GOD | 94717 | 29/08/2024 | 29/08/2024 | General Books | BOS-000461 | |||||||
| Dewey Decimal Classification | DS (Data Science) | Raj Kumar Goel Institute of Technology | Raj Kumar Goel Institute of Technology | 29/08/2024 | ₹ | 1099.00 | 1 | 004 GOD | 94718 | 25/08/2025 | 29/08/2024 | General Books | BOS-000461 | 08/09/2025 | 25/08/2025 | ||||
| Dewey Decimal Classification | DS (Data Science) | Raj Kumar Goel Institute of Technology | Raj Kumar Goel Institute of Technology | 29/08/2024 | ₹ | 1099.00 | 1 | 004 GOD | 94719 | 25/10/2024 | 29/08/2024 | General Books | BOS-000461 | 08/11/2024 | 25/10/2024 | ||||
| Dewey Decimal Classification | DS (Data Science) | Raj Kumar Goel Institute of Technology | Raj Kumar Goel Institute of Technology | 29/08/2024 | ₹ | 1099.00 | 3 | 004 GOD | 94720 | 12/01/2026 | 29/08/2024 | General Books | BOS-000461 | 24/12/2025 | |||||
| Dewey Decimal Classification | DS (Data Science) | Raj Kumar Goel Institute of Technology | Raj Kumar Goel Institute of Technology | 29/08/2024 | ₹ | 1099.00 | 2 | 004 GOD | 94721 | 08/07/2025 | 29/08/2024 | General Books | BOS-000461 | 25/06/2025 | |||||
| Dewey Decimal Classification | DS (Data Science) | Raj Kumar Goel Institute of Technology | Raj Kumar Goel Institute of Technology | 29/08/2024 | ₹ | 1099.00 | 004 GOD | 94722 | 29/08/2024 | 29/08/2024 | General Books | BOS-000461 | |||||||
| Dewey Decimal Classification | DS (Data Science) | Raj Kumar Goel Institute of Technology | Raj Kumar Goel Institute of Technology | 29/08/2024 | ₹ | 1099.00 | 004 GOD | 94723 | 29/08/2024 | 29/08/2024 | General Books | BOS-000461 | |||||||
| Dewey Decimal Classification | DS (Data Science) | Raj Kumar Goel Institute of Technology | Raj Kumar Goel Institute of Technology | 29/08/2024 | ₹ | 1099.00 | 1 | 004 GOD | 94724 | 17/02/2025 | 29/08/2024 | General Books | BOS-000461 | 26/09/2024 |
