Introduction to information security and cyber laws / (Record no. 234229)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03377nam a22002417a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250425113115.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250424b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9789351194736 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | AIMIT LIBRARY |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 1st |
Classification number | 005.8 |
Item number | TRIS |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Tripathi, Surya Prakash. |
9 (RLIN) | 208775 |
245 ## - TITLE STATEMENT | |
Title | Introduction to information security and cyber laws / |
Statement of responsibility, etc. | By Surya Prakash Tripathi ...[et.al.]. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | New Delhi : |
Name of publisher, distributor, etc. | Dreamtech Press , |
Date of publication, distribution, etc. | 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xii,212 p.; |
Other physical details | PB |
Dimensions | 24.5 cm. |
500 ## - GENERAL NOTE | |
General note | The rapid growth of Information and Communication Technology (ICT) has raised the bar for the security requirements also. Lots of data is received, stored, processed, and transmitted. Therefore, its security is extremely important. The Information Security and Cyber Law book helps you to understand the major aspects of information security, including information assurance, cybercrime, threats to the security of information systems, risk assessment and countermeasures. This book covers details about the ways in which you can mitigate risks and overcome the issues that may cause harms to an information system’s security. The book also provides you knowledge of various laws, such as patent law and copy right law, which have been constituted in the field of information security. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | <br/>Contents :<br/><br/>Chapter 1: Introduction to Information Systems and Security<br/><br/>1.1 Information Systems<br/><br/>1.2 Types of IS<br/><br/>1.3 Development of IS<br/><br/>1.4 Introduction to Information Security<br/><br/>1.5 Need for Information Security<br/><br/>1.6 Threats to Information Systems<br/><br/>1.7 Information Assurance<br/><br/>1.8 Cyber Security<br/><br/><br/>Chapter 2: Introduction to Application Security and Counter Measures<br/><br/>2.1 Introduction to Application Security<br/><br/>2.2 Data Security Considerations<br/><br/>2.3 Security Technologies<br/><br/>2.4 Security Threats<br/><br/>2.5 Security Threats to E-Commerce<br/><br/>2.6 E-Cash and Electronic Payment System<br/><br/>2.7 Credit/Debit/Smart Cards<br/><br/>2.8 Digital Signature<br/><br/>2.9 Cryptography and Encryption<br/><br/>Chapter 3: Introduction to Security Measures<br/><br/>3.1 Secure Information System Development<br/><br/>3.2 Application Development Security<br/><br/>3.3 Information Security Governance and Risk Management<br/><br/>3.4 Security Architecture and Design<br/><br/>3.5 Security Issues in Hardware, Data Storage, and Downloadable Devices<br/><br/>3.6 Physical Security of IT Assets<br/><br/>3.7 Backup Security Measures<br/><br/>Chapter 4: Introduction to Security Policies and Cyber Laws<br/><br/>4.1 Need for an Information Security Policy<br/><br/>4.2 Information Security Standards - ISO<br/><br/>4.3 Introducing Various Security Policies and Their Review Process<br/><br/>4.4 Introduction to Indian Cyber Law<br/><br/>4.5 Objective and Scope of the IT Act, 2000<br/><br/>4.6 Intellectual Property Issues<br/><br/>4.7 Overview of Intellectual-Property- Related Legislation in India<br/><br/>4.8 Patent<br/><br/>4.9 Copyright<br/><br/>4.10 Law Related to Semiconductor Layout and Design<br/><br/>4.11 Software License |
Statement of responsibility | Praveen Kumar Shukla is member of Senior Lecturer & Head of Department at Department of Information Technology in Babu Banarasi Das Northern India Institute of Technology |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Introduction to application security and counter measures |
9 (RLIN) | 208776 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Introduction to security policies and cyber laws |
9 (RLIN) | 208777 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Introduction to security measures |
9 (RLIN) | 208778 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book |
Edition | 1st |
Call number prefix | 005.8 TRIS |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Cost, replacement price | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | MBA | St Aloysius Institute of Management & Information Technology | St Aloysius Institute of Management & Information Technology | Business Law | 03/17/2025 | Biblios Book Point | 449.00 | Bill.no:7480; Bill.dt:2025/03/12 | 005.8 TRIS | MBA15097 | 07/19/2025 | 350.22 | 04/24/2025 | Book | |||||
Dewey Decimal Classification | MBA | St Aloysius Institute of Management & Information Technology | St Aloysius Institute of Management & Information Technology | Business Law | 03/17/2025 | Biblios Book Point | 449.00 | Bill.no:7480; Bill.dt:2025/03/12 | 005.8 TRIS | MBA15098 | 07/19/2025 | 350.22 | 04/24/2025 | Book |