Introduction to information security and cyber laws / (Record no. 234229)

MARC details
000 -LEADER
fixed length control field 03377nam a22002417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250425113115.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250424b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789351194736
040 ## - CATALOGING SOURCE
Transcribing agency AIMIT LIBRARY
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 1st
Classification number 005.8
Item number TRIS
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Tripathi, Surya Prakash.
9 (RLIN) 208775
245 ## - TITLE STATEMENT
Title Introduction to information security and cyber laws /
Statement of responsibility, etc. By Surya Prakash Tripathi ...[et.al.].
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New Delhi :
Name of publisher, distributor, etc. Dreamtech Press ,
Date of publication, distribution, etc. 2024.
300 ## - PHYSICAL DESCRIPTION
Extent xii,212 p.;
Other physical details PB
Dimensions 24.5 cm.
500 ## - GENERAL NOTE
General note The rapid growth of Information and Communication Technology (ICT) has raised the bar for the security requirements also. Lots of data is received, stored, processed, and transmitted. Therefore, its security is extremely important. The Information Security and Cyber Law book helps you to understand the major aspects of information security, including information assurance, cybercrime, threats to the security of information systems, risk assessment and countermeasures. This book covers details about the ways in which you can mitigate risks and overcome the issues that may cause harms to an information system’s security. The book also provides you knowledge of various laws, such as patent law and copy right law, which have been constituted in the field of information security.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note <br/>Contents :<br/><br/>Chapter 1: Introduction to Information Systems and Security<br/><br/>1.1 Information Systems<br/><br/>1.2 Types of IS<br/><br/>1.3 Development of IS<br/><br/>1.4 Introduction to Information Security<br/><br/>1.5 Need for Information Security<br/><br/>1.6 Threats to Information Systems<br/><br/>1.7 Information Assurance<br/><br/>1.8 Cyber Security<br/><br/><br/>Chapter 2: Introduction to Application Security and Counter Measures<br/><br/>2.1 Introduction to Application Security<br/><br/>2.2 Data Security Considerations<br/><br/>2.3 Security Technologies<br/><br/>2.4 Security Threats<br/><br/>2.5 Security Threats to E-Commerce<br/><br/>2.6 E-Cash and Electronic Payment System<br/><br/>2.7 Credit/Debit/Smart Cards<br/><br/>2.8 Digital Signature<br/><br/>2.9 Cryptography and Encryption<br/><br/>Chapter 3: Introduction to Security Measures<br/><br/>3.1 Secure Information System Development<br/><br/>3.2 Application Development Security<br/><br/>3.3 Information Security Governance and Risk Management<br/><br/>3.4 Security Architecture and Design<br/><br/>3.5 Security Issues in Hardware, Data Storage, and Downloadable Devices<br/><br/>3.6 Physical Security of IT Assets<br/><br/>3.7 Backup Security Measures<br/><br/>Chapter 4: Introduction to Security Policies and Cyber Laws<br/><br/>4.1 Need for an Information Security Policy<br/><br/>4.2 Information Security Standards - ISO<br/><br/>4.3 Introducing Various Security Policies and Their Review Process<br/><br/>4.4 Introduction to Indian Cyber Law<br/><br/>4.5 Objective and Scope of the IT Act, 2000<br/><br/>4.6 Intellectual Property Issues<br/><br/>4.7 Overview of Intellectual-Property- Related Legislation in India<br/><br/>4.8 Patent<br/><br/>4.9 Copyright<br/><br/>4.10 Law Related to Semiconductor Layout and Design<br/><br/>4.11 Software License
Statement of responsibility Praveen Kumar Shukla is member of Senior Lecturer & Head of Department at Department of Information Technology in Babu Banarasi Das Northern India Institute of Technology
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Introduction to application security and counter measures
9 (RLIN) 208776
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Introduction to security policies and cyber laws
9 (RLIN) 208777
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Introduction to security measures
9 (RLIN) 208778
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Edition 1st
Call number prefix 005.8 TRIS
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
    Dewey Decimal Classification     MBA St Aloysius Institute of Management & Information Technology St Aloysius Institute of Management & Information Technology Business Law 03/17/2025 Biblios Book Point 449.00 Bill.no:7480; Bill.dt:2025/03/12   005.8 TRIS MBA15097 07/19/2025 350.22 04/24/2025 Book
    Dewey Decimal Classification     MBA St Aloysius Institute of Management & Information Technology St Aloysius Institute of Management & Information Technology Business Law 03/17/2025 Biblios Book Point 449.00 Bill.no:7480; Bill.dt:2025/03/12   005.8 TRIS MBA15098 07/19/2025 350.22 04/24/2025 Book