Cyber Security (Record no. 6346)

MARC details
000 -LEADER
fixed length control field 05888nam a22001937a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251225020010.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240829b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788126521791
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004
Item number GOD
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Godbole, Nina
245 ## - TITLE STATEMENT
Title Cyber Security
Remainder of title : Understanding Cyber Crimes, Computer Forensics and Legal Perspectives
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. New Delhi
Name of publisher, distributor, etc. Wiley India Pvt. Ltd
Date of publication, distribution, etc. 2024
300 ## - PHYSICAL DESCRIPTION
Page No. xlv, 570, i18 p
Dimensions 24 x 18 cm
500 ## - GENERAL NOTE
General note This book, focusing on cyberthreats and cybersecurity, provides the much needed awareness in the times of growing cybercrime episodes.<br/><br/>·Comprehensive treatment of important topic - cybersecurity to help readers understand the implications of cybercrime.<br/><br/>·The book provides adequate orientation on laws in reference to cybercrime and cybersecurity taking into account the Indian as well as global scenario.<br/><br/>·Awareness created through simple practical tips and tricks, educates readers to learn how to avoid becoming victims of cybercrime.<br/><br/>·Written by InfoSec domain SME and co-authored by qualified ethical hacking professional who is also a security certified.<br/><br/>·Well-presented case illustrations and examples from real life to underline the significance of topics addressed in each chapter
520 ## - SUMMARY, ETC.
Summary, etc. Introduction to Cybercrime<br/><br/>Introduction<br/><br/>Cybercrime: Definition and Origins of the Word<br/><br/>Cybercrime and Information Security<br/><br/>Who are Cybercriminals?<br/><br/>Classifications of Cybercrimes<br/><br/>Cybercrime: The Legal Perspectives<br/><br/>Cybercrimes: An Indian Perspective<br/><br/>Cybercrime and the Indian ITA 2000<br/><br/>A Global Perspective on Cybercrimes<br/><br/>Cybercrime Era: Survival Mantra for the Netizens<br/><br/>Concluding Remarks and Way Forward to Further Chapters<br/><br/>Cyberoffenses: How Criminals Plan Them<br/><br/>Introduction<br/><br/>How Criminals Plan the Attacks<br/><br/>Social Engineering<br/><br/>Cyberstalking<br/><br/>Cybercafe and Cybercrimes<br/><br/>Botnets: The Fuel for Cybercrime<br/><br/>Attack Vector<br/><br/>Cloud Computing<br/><br/>Cybercrime: Mobile and Wireless Devices<br/><br/>Introduction<br/><br/>Proliferation of Mobile and Wireless Devices<br/><br/>Trends in Mobility<br/><br/>Credit Card Frauds in Mobile and Wireless Computing Era<br/><br/>Security Challenges Posed by Mobile Devices<br/><br/>Registry Settings for Mobile Devices<br/><br/>Authentication Service Security<br/><br/>Attacks on Mobile/Cell Phones<br/><br/>Mobile Devices: Security Implications for Organizations<br/><br/>Organizational Measures for Handling Mobile<br/><br/>Organizational Security Policies and Measures in Mobile Computing Era<br/><br/>Laptops<br/><br/>Tools and Methods Used in Cybercrime<br/><br/>Introduction<br/><br/>Proxy Servers and Anonymizers<br/><br/>Phishing<br/><br/>Password Cracking<br/><br/>Keyloggers and Spywares<br/><br/>Virus and Worms<br/><br/>Trojan Horses and Backdoors<br/><br/>Steganography<br/><br/>DoS and DDoS Attacks<br/><br/>SQL Injection<br/><br/>Buffer Overflow<br/><br/>Attacks on Wireless Networks<br/><br/>Phishing and Identity Theft<br/><br/>Introduction<br/><br/>Phishing<br/><br/>Identity Theft (ID Theft)<br/><br/>Cybercrimes and Cybersecurity: The Legal Perspectives<br/><br/>Introduction<br/><br/>Cybercrime and the Legal Landscape around the World<br/><br/>Why Do We Need Cyberlaws: The Indian Context<br/><br/>The Indian IT Act<br/><br/>Challenges to Indian Law and Cybercrime Scenario in India<br/><br/>Consequences of Not Addressing the Weakness in Information Technology Act<br/><br/>Digital Signatures and the Indian IT Act<br/><br/>Amendments to the Indian IT Act<br/><br/>Cybercrime and Punishment<br/><br/>Cyberlaw, Technology and Students: Indian Scenario<br/><br/>Understanding Computer Forensics<br/><br/>Introduction<br/><br/>Historical Background of Cyberforensics<br/><br/>Digital Forensics Science<br/><br/>The Need for Computer Forensics<br/><br/>Cyberforensics and Digital Evidence<br/><br/>Forensics Analysis of E-Mail<br/><br/>Digital Forensics Life Cycle<br/><br/>Chain of Custody Concept<br/><br/>Network Forensics<br/><br/>Approaching a Computer Forensics Investigation<br/><br/>Setting up a Computer Forensics Laboratory: Understanding the Requirements<br/><br/>Computer Forensics and Steganography<br/><br/>Relevance of the OSI 7 Layer Model to Computer Forensics<br/><br/>Forensics and Social Networking Sites: The Security/Privacy Threats<br/><br/>Computer Forensics from Compliance Perspective<br/><br/>Challenges in Computer Forensics<br/><br/>Special Tools and Techniques<br/><br/>Forensics Auditing<br/><br/>Antiforensics<br/><br/>Forensics of Hand-Held Devices<br/><br/>Introduction<br/><br/>Understanding Cell Phone Working Characteristics<br/><br/>Hand-Held Devices and Digital Forensics<br/><br/>Toolkits for Hand-Held Device Forensics<br/><br/>Forensics of iPods and Digital Music Devices<br/><br/>An Illustration on Real Life Use of Forensics<br/><br/>Techno-Legal Challenges with Evidence from Hand-Held Devices<br/><br/>Organizational Guidelines on Cell Phone Forensics<br/><br/>Cybersecurity: Organizational Implications<br/><br/>Introduction<br/><br/>Cost of Cybercrimes and IPR Issues: Lessons for Organizations<br/><br/>Web Threats for Organizations: The Evils and Perils<br/><br/>Security and Privacy Implications from Cloud Computing<br/><br/>Social Media Marketing: Security Risks and Perils for Organizations<br/><br/>Social Computing and the Associated Challenges for Organizations<br/><br/>Protecting Peoples Privacy in the Organization<br/><br/>Organizational Guidelines for Internet Usage, Safe Computing Guidelines and Computer Usage Policy<br/><br/>Incident Handling: An Essential Component of Cybersecurity<br/><br/>Forensics Best Practices for Organizations<br/><br/>Media and Asset Protection: Best Practices for Organizations<br/><br/>Importance of Endpoint Security in Organizations<br/><br/>Cybercrime and Cyberterrorism: Social, Political, Ethical and Psychological Dimensions<br/><br/>Introduction<br/><br/>Intellectual Property in the Cyberspace<br/><br/>The Ethical Dimension of Cybercrimes<br/><br/>The Psychology, Mindset and Skills of Hackers and Other Cybercriminals<br/><br/>Sociology of Cybercriminals<br/><br/>Information Warfare: Perception or An Eminent Reality?<br/><br/>Cybercrime: Illustrations, Examples and Mini-Cases<br/><br/>Introduction<br/><br/>Real-Life Examples<br/><br/>Mini-Cases<br/><br/>Illustrations of Financial Frauds in Cyber Domain<br/><br/>Digital Signature-Related Crime Scenarios<br/><br/>Digital Forensics Case Illustrations<br/><br/>Online Scams<br/><br/>Careers in Cybersecurity<br/><br/>Introduction<br/><br/>IT Security Organization<br/><br/>Career Paths in Cybersecurity<br/><br/>Cybersecurity Certifications<br/><br/>Guide Path<br/><br/>Index
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Belapure, Sunit
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book Bank
Koha issues (borrowed), all copies 8
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Currency Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Bill Date Koha item type Bill Number Checked out Date last checked out
    Dewey Decimal Classification     DS (Data Science) Raj Kumar Goel Institute of Technology Raj Kumar Goel Institute of Technology 29/08/2024 1099.00   004 GOD 94715 29/08/2024 29/08/2024 Reference BOS-000461    
    Dewey Decimal Classification     DS (Data Science) Raj Kumar Goel Institute of Technology Raj Kumar Goel Institute of Technology 29/08/2024 1099.00   004 GOD 94716 29/08/2024 29/08/2024 Reference BOS-000461    
    Dewey Decimal Classification     DS (Data Science) Raj Kumar Goel Institute of Technology Raj Kumar Goel Institute of Technology 29/08/2024 1099.00   004 GOD 94717 29/08/2024 29/08/2024 General Books BOS-000461    
    Dewey Decimal Classification     DS (Data Science) Raj Kumar Goel Institute of Technology Raj Kumar Goel Institute of Technology 29/08/2024 1099.00 1 004 GOD 94718 25/08/2025 29/08/2024 General Books BOS-000461 08/09/2025 25/08/2025
    Dewey Decimal Classification     DS (Data Science) Raj Kumar Goel Institute of Technology Raj Kumar Goel Institute of Technology 29/08/2024 1099.00 1 004 GOD 94719 25/10/2024 29/08/2024 General Books BOS-000461 08/11/2024 25/10/2024
    Dewey Decimal Classification     DS (Data Science) Raj Kumar Goel Institute of Technology Raj Kumar Goel Institute of Technology 29/08/2024 1099.00 3 004 GOD 94720 12/01/2026 29/08/2024 General Books BOS-000461   24/12/2025
    Dewey Decimal Classification     DS (Data Science) Raj Kumar Goel Institute of Technology Raj Kumar Goel Institute of Technology 29/08/2024 1099.00 2 004 GOD 94721 08/07/2025 29/08/2024 General Books BOS-000461   25/06/2025
    Dewey Decimal Classification     DS (Data Science) Raj Kumar Goel Institute of Technology Raj Kumar Goel Institute of Technology 29/08/2024 1099.00   004 GOD 94722 29/08/2024 29/08/2024 General Books BOS-000461    
    Dewey Decimal Classification     DS (Data Science) Raj Kumar Goel Institute of Technology Raj Kumar Goel Institute of Technology 29/08/2024 1099.00   004 GOD 94723 29/08/2024 29/08/2024 General Books BOS-000461    
    Dewey Decimal Classification     DS (Data Science) Raj Kumar Goel Institute of Technology Raj Kumar Goel Institute of Technology 29/08/2024 1099.00 1 004 GOD 94724 17/02/2025 29/08/2024 General Books BOS-000461   26/09/2024
Implemented & Customized by: BestBookBuddies

Powered by Koha