Cyber Security and Cyber Laws
Language: English Publication details: Delhi Cengage Learning India Pvt. Ltd. 2018 Description: xxiii, 442pISBN: 978-93-87511-67-5Subject(s): Data processing and computer scienceDDC classification: 004Item type | Home library | Collection | Call number | Materials specified | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Sateri Pissani Education Society's Shri Gopal Gaonkar Memorial College Goa Multi - Faculty College, Dayanandnagar, Dharbandora SPE-Department of IT & Computer Applications | SPE-IT & Computer Applications | 004 BAS/Cyb (Browse shelf(Opens below)) | Available | SPE-3764 | ||
![]() |
Sateri Pissani Education Society's Shri Gopal Gaonkar Memorial College Goa Multi - Faculty College, Dayanandnagar, Dharbandora SPE-Department of IT & Computer Applications | SPE-IT & Computer Applications | 004 BAS/Cyb (Browse shelf(Opens below)) | Available | SPE-3765 | ||
![]() |
Sateri Pissani Education Society's Shri Gopal Gaonkar Memorial College Goa Multi - Faculty College, Dayanandnagar, Dharbandora SPE-Department of IT & Computer Applications | SPE-IT & Computer Applications | 004 BAS/Cyb (Browse shelf(Opens below)) | Available | SPE-3766 |
Browsing Sateri Pissani Education Society's Shri Gopal Gaonkar Memorial College Goa Multi - Faculty College, Dayanandnagar, Dharbandora shelves, Shelving location: SPE-Department of IT & Computer Applications, Collection: SPE-IT & Computer Applications Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
001.4226 CAM/Dat Data Visualization : Exploring and Explaining with Data | 001.4226 CAM/Dat Data Visualization : Exploring and Explaining with Data | 001.642 AGA/Stu Study Package MCA Entrances | 004 BAS/Cyb Cyber Security and Cyber Laws | 004 BAS/Cyb Cyber Security and Cyber Laws | 004 BAS/Cyb Cyber Security and Cyber Laws | 004 DUB/Eme Emerging Technologies for Effective Management |
1 - Ethics of Hacking and Cracking
2 - Reconnaisance
3 - Scanning Tools
4 - Sniffers
5 - TCP/IP Vulnerabilities
6 - Encryption and Password Cracking
7 - Spoofing
8 - Session Hijacking
9 - Programming Exploits
10 - Mail Vulnerabilities
11 - Web Application Vulnerabilities
12 - Windows Vulnerabilities
13 - UNIX/Linux Vulnerabilities
14 - Incident Handling
15 - Internet Law and Cyber Crimes
16 - The Information Technology Act, 2000
There are no comments on this title.