000 | 00915nam a22001697a 4500 | ||
---|---|---|---|
020 | _a978-93-87511-67-5 | ||
041 | _aeng | ||
082 |
_a004 _bBAS/Cyb |
||
100 |
_aBasta, Alfred _91611287 |
||
245 | _aCyber Security and Cyber Laws | ||
260 |
_aDelhi _bCengage Learning India Pvt. Ltd. _c2018 |
||
300 | _axxiii, 442p. | ||
505 | _a1 - Ethics of Hacking and Cracking 2 - Reconnaisance 3 - Scanning Tools 4 - Sniffers 5 - TCP/IP Vulnerabilities 6 - Encryption and Password Cracking 7 - Spoofing 8 - Session Hijacking 9 - Programming Exploits 10 - Mail Vulnerabilities 11 - Web Application Vulnerabilities 12 - Windows Vulnerabilities 13 - UNIX/Linux Vulnerabilities 14 - Incident Handling 15 - Internet Law and Cyber Crimes 16 - The Information Technology Act, 2000 | ||
650 |
_a Data processing and computer science _91611288 |
||
700 |
_aBasta, Nadine and Et. al. _91611289 |
||
942 | _cBK | ||
999 |
_c1055956 _d1055956 |