Cyber security and cyber laws / (Record no. 230389)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04254nam a22002417a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250421155028.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240315b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9789390395750 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | AIMIT LIBRARY |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 1 |
Classification number | 005.8 |
Item number | JAIN |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Jain, Nilakshi. |
9 (RLIN) | 154569 |
245 ## - TITLE STATEMENT | |
Title | Cyber security and cyber laws / |
Statement of responsibility, etc. | By Nilakshi Jain and Menon Ramesh. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | New Delhi : |
Name of publisher, distributor, etc. | Wiley India Pvt Ltd , |
Date of publication, distribution, etc. | 2021. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxi,346 p.; |
Other physical details | 25 cm. |
Dimensions | PB |
500 ## - GENERAL NOTE | |
General note | Cyber Security and Cyber Laws gives a crystal-clear introduction to cyber security for people who do not have a technical background. This book educates on topics like cyberspace, cybercrime, cyber offense, various acts, laws, methods, and various acts, laws, methods and tools used for Cyber Security. It is enriched with the explanation of social media, botnet and the intrusion detection, relation of cyber security with industrial control systems, and the role of automation in cyber security. This book also discusses the legal and regulatory aspects of cyber security and examines the regional, national, and international regulatory responses to cyber security. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 1 Introduction to Cybercrime<br/><br/>1.1 Introduction<br/><br/>1.2 Introduction to Cybercrime<br/><br/>1.3 Cybercrime Definition and Origins of Cybercrime of the World<br/><br/>1.4 Cybercrime and Information Security<br/><br/>1.5 Classifications of Cybercrime<br/><br/>1.6 Cybercrime and the Indian IT Act, 2000<br/><br/>1.7 A Global Perspective on Cybercrimes<br/><br/> <br/><br/>Chapter 2 Cyber Offences and Cybercrime<br/><br/>2.1 Introduction<br/><br/>2.2 Strategic Attacks<br/><br/>2.3 Types of Attacks<br/><br/>2.4 Proliferation of Mobile and Wireless Devices<br/><br/>2.5 Trends in Mobility Wireless Era<br/><br/>2.6 Security Challenges Faced by Mobile Devices<br/><br/>2.7 Registry Setting for Mobile Devices<br/><br/>2.8 Authentication Service Security<br/><br/>2.9 Attacks on Mobile Phones<br/><br/>2.10 Security Implications for Organizations<br/><br/>2.11 Organizational Measures for Handling Mobile Phones: Device Related Security Issues<br/><br/>2.12 Security Policies and Measures in Mobile Computing Era and Laptops<br/><br/> <br/><br/>Chapter 3 Methods and Tools used in Cyber Line<br/><br/>3.1 Introduction<br/><br/>3.2 Password Cracking<br/><br/>3.3 Keyloggers and Spywares, Virus and Worms, Trojan and Backdoor, Steganography<br/><br/>3.5 SQL Injection and Buffer Overflow<br/><br/>3.6 Phishing and Identity Theft (ID Theft)<br/><br/>3.7 Enumeration<br/><br/>3.8 Attacks on Wireless Networks<br/><br/> <br/><br/>Chapter 4 Concept of Cyberspace and Cyber Law<br/><br/>4.1 Introduction to e-Commerce<br/><br/>4.2 Contract Aspects in Cyber Law<br/><br/>4.3 Security Aspects of Cyber Law<br/><br/>4.4 Intellectual Property Aspect in Cyber Law and Evidence Aspect in Cyber Law<br/><br/>4.5 The Criminal Aspects in Cyber Law<br/><br/>4.6 Global Trends in Cyber Law<br/><br/>4.7 Legal Framework for Electronic Data Interchange Law Relating to Electronic Banking<br/><br/>4.8 Need for Indian Cyber Law<br/><br/> <br/><br/>Chapter 5 Information Technology Act<br/><br/>5.1 Introduction of Cybercrime and Cybersecurity<br/><br/>5.2 Information Technology Act, 2000<br/><br/>5.3 Penalties, Adjudication and Appeals Under the Information Technology Act, 2000<br/><br/>5.4 Offences Under Information Technology Act, 2000<br/><br/>5.5 Cyber Appellate Tribunal<br/><br/>5.6 Information Technology Act, 2008 and Its Amendments<br/><br/> <br/><br/>Chapter 6 Information Security Standard Compliances<br/><br/>6.1 Introduction<br/><br/>6.2 Sarbanes–Oxley Act (SOX)<br/><br/>6.3 Gramm–Leach–Bliley Act (GLBA)<br/><br/>6.4 Health Insurance Portability and Accountability Act (HIPAA)<br/><br/>6.5 Federal Information Security Management Act (FISMA)<br/><br/>6.6 The North American Electric Reliability Corporation (NERC)<br/><br/>6.7 PCI (Payment Card Industry) Compliance<br/><br/>6.8 ISO/IEC 27000<br/><br/> <br/><br/>Summary<br/><br/>Review Questions<br/><br/>References<br/><br/>Appendix A<br/><br/>Appendix B<br/><br/>Index |
Statement of responsibility | Dr. Nilakshi Jain is currently serving as an Associate Professor, Research Coordinator at Research Cell SAKEC, Centre Coordinator at SAKEC National Cyber Defense Resource Centre and Coordinator at SAKEC-IQAC in Shah and Anchor Kutchhi Engineering College, Chembur Mumbai<br/><br/> |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Introduction to cybercrime |
9 (RLIN) | 154570 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cyber offences and cybercrime |
9 (RLIN) | 154571 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Methods and tools used in cyber line |
9 (RLIN) | 154572 |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Mendon, Ramesh. |
9 (RLIN) | 154573 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book |
Edition | 1st |
Call number prefix | 005.8 JAIN |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Date acquired | Source of acquisition | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type | Cost, normal purchase price | Cost, replacement price |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | MCA | St Aloysius Institute of Management & Information Technology | St Aloysius Institute of Management & Information Technology | 03/07/2024 | Biblios Book Point | Bill no:8337; Bill dt:2024-03-04 | 005.8 JAIN | MCA17244 | 07/21/2025 | 03/15/2024 | Book | |||||||
Dewey Decimal Classification | MBA | St Aloysius Institute of Management & Information Technology | St Aloysius Institute of Management & Information Technology | 03/11/2025 | Biblios Book Point | Bill no:7466; Bill dt:2025/3/11 | 005.8 JAIN | MBA14844 | 07/21/2025 | 04/17/2025 | Book | 629.00 | 490.62 | |||||
Dewey Decimal Classification | MBA | St Aloysius Institute of Management & Information Technology | St Aloysius Institute of Management & Information Technology | 03/11/2025 | Biblios Book Point | Bill no:7466; Bill dt:2025/3/11 | 005.8 JAIN | MBA14845 | 07/21/2025 | 04/17/2025 | Book | 629.00 | 490.62 |