000 00915nam a22001697a 4500
020 _a978-93-87511-67-5
041 _aeng
082 _a004
_bBAS/Cyb
100 _aBasta, Alfred
_91611287
245 _aCyber Security and Cyber Laws
260 _aDelhi
_bCengage Learning India Pvt. Ltd.
_c2018
300 _axxiii, 442p.
505 _a1 - Ethics of Hacking and Cracking 2 - Reconnaisance 3 - Scanning Tools 4 - Sniffers 5 - TCP/IP Vulnerabilities 6 - Encryption and Password Cracking 7 - Spoofing 8 - Session Hijacking 9 - Programming Exploits 10 - Mail Vulnerabilities 11 - Web Application Vulnerabilities 12 - Windows Vulnerabilities 13 - UNIX/Linux Vulnerabilities 14 - Incident Handling 15 - Internet Law and Cyber Crimes 16 - The Information Technology Act, 2000
650 _a Data processing and computer science
_91611288
700 _aBasta, Nadine and Et. al.
_91611289
942 _cBK
999 _c1055956
_d1055956