Amazon cover image
Image from Amazon.com

Cyber Security and Cyber Laws

By: Basta, AlfredContributor(s): Basta, Nadine and Et. alLanguage: English Publication details: Delhi Cengage Learning India Pvt. Ltd. 2018 Description: xxiii, 442pISBN: 978-93-87511-67-5Subject(s): Data processing and computer scienceDDC classification: 004
Contents:
1 - Ethics of Hacking and Cracking 2 - Reconnaisance 3 - Scanning Tools 4 - Sniffers 5 - TCP/IP Vulnerabilities 6 - Encryption and Password Cracking 7 - Spoofing 8 - Session Hijacking 9 - Programming Exploits 10 - Mail Vulnerabilities 11 - Web Application Vulnerabilities 12 - Windows Vulnerabilities 13 - UNIX/Linux Vulnerabilities 14 - Incident Handling 15 - Internet Law and Cyber Crimes 16 - The Information Technology Act, 2000
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Books Books Sateri Pissani Education Society's Shri Gopal Gaonkar Memorial College Goa Multi - Faculty College, Dayanandnagar, Dharbandora
SPE-Department of IT & Computer Applications
SPE-IT & Computer Applications 004 BAS/Cyb (Browse shelf(Opens below)) Available SPE-3764
Books Books Sateri Pissani Education Society's Shri Gopal Gaonkar Memorial College Goa Multi - Faculty College, Dayanandnagar, Dharbandora
SPE-Department of IT & Computer Applications
SPE-IT & Computer Applications 004 BAS/Cyb (Browse shelf(Opens below)) Available SPE-3765
Books Books Sateri Pissani Education Society's Shri Gopal Gaonkar Memorial College Goa Multi - Faculty College, Dayanandnagar, Dharbandora
SPE-Department of IT & Computer Applications
SPE-IT & Computer Applications 004 BAS/Cyb (Browse shelf(Opens below)) Available SPE-3766
Browsing Sateri Pissani Education Society's Shri Gopal Gaonkar Memorial College Goa Multi - Faculty College, Dayanandnagar, Dharbandora shelves, Shelving location: SPE-Department of IT & Computer Applications, Collection: SPE-IT & Computer Applications Close shelf browser (Hides shelf browser)
001.4226 CAM/Dat Data Visualization : Exploring and Explaining with Data 001.4226 CAM/Dat Data Visualization : Exploring and Explaining with Data 001.642 AGA/Stu Study Package MCA Entrances 004 BAS/Cyb Cyber Security and Cyber Laws 004 BAS/Cyb Cyber Security and Cyber Laws 004 BAS/Cyb Cyber Security and Cyber Laws 004 DUB/Eme Emerging Technologies for Effective Management

1 - Ethics of Hacking and Cracking
2 - Reconnaisance
3 - Scanning Tools
4 - Sniffers
5 - TCP/IP Vulnerabilities
6 - Encryption and Password Cracking
7 - Spoofing
8 - Session Hijacking
9 - Programming Exploits
10 - Mail Vulnerabilities
11 - Web Application Vulnerabilities
12 - Windows Vulnerabilities
13 - UNIX/Linux Vulnerabilities
14 - Incident Handling
15 - Internet Law and Cyber Crimes
16 - The Information Technology Act, 2000

There are no comments on this title.

to post a comment.

Powered by Koha