Professional Documents
Culture Documents
` 299/-
The Cyber Law and Information Security book touches almost every important aspect of cyber law and need of information
security, such as what is cyber law and how is it used to deal with cyber crimes, fundamental concepts of e-commerce (including models and generations of e-commerce, advantages of e-commerce, e-governance and EDI, e-cash, e-payment, and security threats), ethical issues in data and software privacy, Internet security threats, digital signatures, information security, cryptography, VPN, and
Key Features:
Need of cyber law, objective and scope of the IT Act 2000, Indian Cyber Law, Uncitral Model Law u Intellectual property issues and cyber space, overview of intellectual property related to legislation in India, patents, copyrights, u trademarks, law related to semiconductor layout and design Fundamentals of e-commerce, security threats to e-commerce, virtual organization, business transactions on Web, e-governance u and EDI, concepts in electronic payment systems, e-cash, credit/debit cards, e-agreement, legal recognition of electronic and digital records, e-commerce, and issues of privacy Physical security and its need, disaster management and control, basic tenets of physical security, and physical entry controls u statements Access control, biometrics, factors in biometric system, criteria for selection of biometric, design issues in the biometric system, u interoperability issues, economic and social aspects, legal challenges Digital signatures and technical issues, legal issues, electronic records, digital contracts, requirements of the digital signature u system Cyber crime, cyber jurisdiction, cyber crime and evidence act, treatment of cyber crime in different countries, ethical issues in u data and software privacy, plagiarism, pornography, tampering computer documents Internet security threats such as hacking, cracking, viruses, trojan horse, malicious code, and logic bombs u Certifying authorities and their need, appointment, function of controller, generation, suspension, and revocation u Information systems and its importance, role of security in Internet and Web services, principles of information security, u classification of threats and attacks, security challenges, security implication for organizations Introduction to cryptography, issues in documents security, public key, private key, firewalls u Basic concepts of network security, perimeters of network protection and network attack, need of intrusion monitoring, and u detection VPN, tunneling VPN, types of VPN and their usage, security concerns in VPN u Concept of networking, IP addressing and subnetting, DNS, DHCP , bootp, active directory, IIS, NAT, WSUS, exchange server, ISA, u wireless network, and Mobile IP
ISBN: 978-93-5119-200-8 | Price: ` 299 | Pages: 252 | Authors: Faiyaz Ahamad, KLSI
Table of Contents:
Fundamentals of Cyber Law:History of Internet | Introduction to Indian Cyber Law | Objective and Scope of the IT Act 2000 | Uncitral Model Law | ISP Guideline | Intellectual property issues | Overview of Intellectual property related legislation in India | Patent | Copyright | Trademark law | Law related to semiconductor layout and design | E Commerce: E-Commerce and its Models | Generations of E-commerce | Advantages of E-commerce | EDI | E-Cash and E-Payment Scheme | Business T r a n s a c t i o n s o n We b o r E - T r a n s a c t i o n | Credit/Debit/Smart Cards | E-Commerce in India | Recent Trends in Shopping | Mobile Commerce | EMarketplace Technology | E-Agreement | Legal Recognition of Electronic and Digital Records | Virtual Organisation | Security in E-Commerce: E-Commerce Issues of privacy | Security Threats to E Commerce | Physical Security | Spyware Technology | Access Control | Digital Signatures | Certificate Issuance | Investigation and Ethics: Cybercrime | Cyber/Resource Theft | Types of cyber crimes/frauds | Cyber frauds in India | Cyber jurisdiction | Dealing with cybercrime in various countries | Ethical issues in data and software privacy | Issues in ethical hacking | Internet security threats | Certifying authorities | Cyber crime forensic |
Information Security:Information Systems | Developing Information System | Principles of Information Security | An Overview of Information Security Management System (ISMS) |Classification of Threats and Attacks | Security Implication for Organisations | Information Classification and their Roles | Some other terms in Information Security | Stages of Vulnerability Management | Cr yptography: Understanding Cryptography and Encryption | Understanding Cryptographic Algorithms | Understanding Cryptanalysis | Describing Code Breaking Methodologies | Describing Cryptographic Attacks | Firewalls | Issues in Documents Security | Basic concepts of Network Security | Perimeters of Network protection and Network attack | Common Attacks | Need of Intrusion Monitoring and Detection | Honeypot | VPN | Networking: Concept of Networking | IP Addressing and Subnetting | Domain Name System(DNS) | Protocol | Services | Network Address Translation (NAT) | Server | Internet Security and Acceleration (ISA) | Wireless network | Ethernet | Fiber Distributed Data Interface(FDDI) | Client Server Model | Concurrency | Byte ordering | Network Socket | Zigbee | RAN | MANET |
DREAMTECH PRESS
19-A, Ansari Road, Daryaganj New Delhi-110 002, INDIA Tel: +91-11-2324 3463-73, Fax: +91-11-2324 3078 Email: feedback@dreamtechpress.com Website: www.dreamtechpress.com
Regional Offices: Bangalore: Tel: +91-80-2313 2383, Fax: +91-80-2312 4319, Email: blrsales@wiley.com Mumbai: Tel: +91-22-2788 9263, 2788 9272, Telefax: +91-22-2788 9263, Email: mumsales@wiley.com Contact Persons: Raju Joseph: +91-9845065992 | Sandeep Rao: +91-9620215542 | Arun Kumar: +91-9611231170
/dtechpress
/dtechpress
/dreamtechpress
/company/dreamtech-press