Stock Image

Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives

Sunit Belapure, Nina Godbole (Authors) & Kamlesh Bajaj (Frwd)

ISBN 10: 8126521791 / ISBN 13: 9788126521791
Published by Wiley India Pvt. Ltd, 2011
New Condition: New Soft cover
From BookVistas (New Delhi, DELHI, India)

AbeBooks Seller Since November 24, 2010

Quantity Available: > 20

Buy New
Price: US$ 18.73 Convert Currency
Shipping: US$ 4.88 From India to U.S.A. Destination, Rates & Speeds
Add to basket

30 Day Return Policy

About this Item

This book, focusing on cyberthreats and cybersecurity, provides the much needed awareness in the times of growing cybercrime episodes. Comprehensive treatment of important topic - cybersecurity to help readers understand the implications of cybercrime. The book provides adequate orientation on laws in reference to cybercrime and cybersecurity taking into account the Indian as well as global scenario. Awareness created through simple practical tips and tricks, educates readers to learn how to avoid becoming victims of cybercrime. Written by InfoSec domain SME and co-authored by qualified ethical hacking professional who is also a security certified. Well-presented case illustrations and examples from real life to underline the significance of topics addressed in each chapter. Introduction to Cybercrime Introduction Cybercrime: Definition and Origins of the Word Cybercrime and Information Security Who are Cybercriminals? Classifications of Cybercrimes Cybercrime: The Legal Perspectives Cybercrimes: An Indian Perspective Cybercrime and the Indian ITA 2000 A Global Perspective on Cybercrimes Cybercrime Era: Survival Mantra for the Netizens Concluding Remarks and Way Forward to Further Chapters Cyberoffenses: How Criminals Plan Them Introduction How Criminals Plan the Attacks Social Engineering Cyberstalking Cybercafe and Cybercrimes Botnets: The Fuel for Cybercrime Attack Vector Cloud Computing Cybercrime: Mobile and Wireless Devices Introduction Proliferation of Mobile and Wireless Devices Trends in Mobility Credit Card Frauds in Mobile and Wireless Computing Era Security Challenges Posed by Mobile Devices Registry Settings for Mobile Devices Authentication Service Security Attacks on Mobile/Cell Phones Mobile Devices: Security Implications for Organizations Organizational Measures for Handling Mobile Organizational Security Policies and Measures in Mobile Computing Era Laptops Tools and Methods Used in Cybercrime Introduction Proxy Servers and Anonymizers Phishing Password Cracking Keyloggers and Spywares Virus and Worms Trojan Horses and Backdoors Steganography DoS and DDoS Attacks SQL Injection Buffer Overflow Attacks on Wireless Networks Phishing and Identity Theft Introduction Phishing Identity Theft (ID Theft) Cybercrimes and Cybersecurity: The Legal Perspectives Introduction Cybercrime and the Legal Landscape around the World Why Do We Need Cyberlaws: The Indian Context The Indian IT Act Challenges to Indian Law and Cybercrime Scenario in India Consequences of Not Addressing the Weakness in Information Technology Act Digital Signatures and the Indian IT Act Amendments to the Indian IT Act Cybercrime and Punishment Cyberlaw, Technology and Students: Indian Scenario Understanding Computer Forensics Introduction Historical Background of Cyberforensics Digital Forensics Science The Need for Computer Forensics Cyberforensics and Digital Evidence Forensics Analysis of E-Mail Digital Forensics Life Cycle Chain of Custody Concept Network Forensics Approaching a Computer Forensics Investigation Setting up a Computer Forensics Laboratory: Understanding the Requirements Computer Forensics and Steganography Relevance of the OSI 7 Layer Model to Computer Forensics Forensics and Social Networking Sites: The Security/Privacy Threats Computer Forensics from Compliance Perspective Challenges in Computer Forensics Special Tools and Techniques Forensics Auditing Antiforensics Forensics of Hand-Held Devices Introduction Understanding Cell Phone Working Characteristics Hand-Held Devices and Digital Forensics Toolkits for Hand-Held Device Forensics Forensics of iPods and Digital Music Devices An Illustration on Real Life Use of Forensics Techno-Leg Printed Pages: 636. Bookseller Inventory # 61063

Ask Seller a Question

Bibliographic Details

Title: Cyber Security: Understanding Cyber Crimes, ...

Publisher: Wiley India Pvt. Ltd

Publication Date: 2011

Binding: Softcover

Book Condition:New

About this title

Synopsis:

This book, focusing on cyberthreats and cybersecurity, provides the much needed awareness in the times of growing cybercrime episode comprehensive treatment of important topic cybersecurity to help readers understand the implications of cybercrime. The book provides adequate orientation on laws in reference to cybercrime and cybersecurity taking into account the indian as well as global scenario. Awareness created through simple practical tips and tricks, educates readers to learn how to avoid becoming victims of cybercrime. Written by infosec domain sme and co-authored by qualified ethical hacking professional who is also a security certified. Well-presented case illustrations and examples from real life to underline the significance of topics addressed in each chapter.

"About this title" may belong to another edition of this title.

Store Description

Visit Seller's Storefront

Terms of Sale:

All books are new. We accept payments by the following methods:

  1. Credit Card: Visa, MasterCard, or American Express.
  2. PayPal: sales@bookvistas.com
  3. Bank Draft or Banker's Cheque.
  4. Bank/Wire Transfer.

Cheques may be made payable to BookVistas.

Books are shipped by DHL, FedEx, Aramex, Registered Air Mail, or Registered SAL (Surface Air
Lifted).


Shipping Terms:

Shipping costs are based on books weighing 2.2 LB, or 1 KG. If your book order is heavy or oversized, we may contact you to let you know extra shipping is required.

List this Seller's Books

Payment Methods
accepted by seller

Visa Mastercard American Express

PayPal Bank Draft Bank/Wire Transfer