0

My Bag

0.00

Download App

Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives 18.0%OFF

Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives

by Sunit Belapure Nina Godbole

  • ISBN

    :  

    9788126521791

  • Publisher

    :  

    Wiley India Pvt Ltd

  • Subject

    :  

    Law, Computer Security

  • Binding

    :  

    Paperback

  • Pages

    :  

    636

  • Year

    :  

    2011

809.0

18.0% OFF

663.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

Estimated Shipping Time : 5-7 Business Days

View Details

Share it on

  • Description

    This book, focusing on cyberthreats and cybersecurity, provides the much needed awareness in the times of growing cybercrime episodes. Comprehensive treatment of important topic - cybersecurity to help readers understand the implications of cybercrime. The book provides adequate orientation on laws in reference to cybercrime and cybersecurity taking into account the Indian as well as global scenario. Awareness created through simple practical tips and tricks, educates readers to learn how to avoid becoming victims of cybercrime. Written by InfoSec domain SME and co-authored by qualified ethical hacking professional who is also a security certified. Well-presented case illustrations and examples from real life to underline the significance of topics addressed in each chapter. Special Features Foreword by Dr Kamlesh Bajaj, CEO, Data Security Council of India. Authors are industry professionals with extensive experience in the domain of Information Security and Data Privacy. A real handy reference that all must have in today’s world of cyberthreat. Aimed at individuals, students (including those doing law courses), IT professionals and legal professionals for building awareness about cybercrime and cybersecurity. Useful for candidates aspiring to appear for international certification exams in the domain of Information Security/IT Security and other related domains. All dimensions of cybersecuritydiscussed - including cyberforensics. Complete with an overview of global laws that matter for cybersecurity. Companion CD contains useful appendices with rich contents that serve as supplementary material to the chapters. Understanding of key concepts facilitated through well-illustrated diagrams, tables and vignettes inside the chapters. Real-life case illustrations and examples provided to help consolidate understanding of topics presented in each chapter. Review questions and reference material pointers after each chapter. Companion CD Contains: 3 Chapters Chapter 10 - Cybercrime and Cyberterrorism: Social Political, Ethical and Psychological Dimensions Chapter 11 - Cybercrime: Illustrations, Examples and Mini-Cases Chapter 12 - Careers in Cybersecurity 23 appendices with guidelines, checklists and handy reference to relevant Indian Acts About The Author Nina Godbole is an author of the book Information Systems Security: Security Management, Metrics, Frameworks and Best Practices published by Wiley India in January 2009. She is also on the Editorial Board of IEEE Computer Society. She has published numerous articles on topics in leading IT magazines. She has a vast work experience in the ITindustry in Software Quality Assurance, systems analysis and design, application support services as well as application audit and IS audit. Nina is a CIPP/IT - a privacy professional certified by the IAPP USA (International Association of Privacy Professional) as well as a CISA (Certified Information Systems Auditor) certified by ISACA USA (Information Systems Audit and Control Association). Nina is also an ITIL foundation certified professional, a PMP, CQA and CSTE from QAI, USA (Quality Assurance Institute). Sunit Belapure has more than 8 years experience in Information Security domain out of his total industry experience of more than 18 years. He works in the domain of ISRM (Information Security and Risk and Management) and Information System Audit. Sunit has respective international certifications to his credit - CISA (Certified Information Systems Auditor) from ISACA-USA, IRCA certified ISO 27001:2005 Lead Auditor, Certified Ethical Hacker (CEH v5.0) from EC-Council-USA and CISM (Certified Information Security Manager) from ISACA-USA. He is a member of ISACA, USA. He engages into Compliance and Assurance assignments (for ERP as well as for Non-ERP applications) under IS security and IT Governance domain. Sunit is a noted speaker on Information Security domain at reputed institutes in and around Pune. Table Of Contents Introduction to Cybercrime Introduction Cybercrime: Definition and Origins of the Word Cybercrime and Information Security Who are Cybercriminals? Classifications of Cybercrimes Cybercrime: The Legal Perspectives Cybercrimes: An Indian Perspective Cybercrime and the Indian ITA 2000 A Global Perspective on Cybercrimes Cybercrime Era: Survival Mantra for the Netizens Concluding Remarks and Way Forward to Further Chapters Cyberoffenses: How Criminals Plan Them Introduction How Criminals Plan the Attacks Social Engineering Cyberstalking Cybercafe and Cybercrimes Botnets: The Fuel for Cybercrime Attack Vector Cloud Computing Cybercrime: Mobile and Wireless Devices Introduction Proliferation of Mobile and Wireless Devices Trends in Mobility Credit Card Frauds in Mobile and Wireless Computing Era Security Challenges Posed by Mobile Devices Registry Settings for Mobile Devices Authentication Service Security Attacks on Mobile/Cell Phones Mobile Devices: Security Implications for Organizations Organizational Measures for Handling Mobile Organizational Security Policies and Measures in Mobile Computing Era Laptops Tools and Methods Used in Cybercrime Introduction Proxy Servers and Anonymizers Phishing Password Cracking Keyloggers and Spywares Virus and Worms Trojan Horses and Backdoors Steganography DoS and DDoS Attacks SQL Injection Buffer Overflow Attacks on Wireless Networks Phishing and Identity Theft Introduction Phishing Identity Theft (ID Theft) Cybercrimes and Cybersecurity: The Legal Perspectives Introduction Cybercrime and the Legal Landscape around the World Why Do We Need Cyberlaws: The Indian Context The Indian IT Act Challenges to Indian Law and Cybercrime Scenario in India Consequences of Not Addressing the Weakness in Information Technology Act Digital Signatures and the Indian IT Act Amendments to the Indian IT Act Cybercrime and Punishment Cyberlaw, Technology and Students: Indian Scenario Understanding Computer Forensics Introduction Historical Background of Cyberforensics Digital Forensics Science The Need for Computer Forensics Cyberforensics and Digital Evidence Forensics Analysis of E-Mail Digital Forensics Life Cycle Chain of Custody Concept Network Forensics Approaching a Computer Forensics Investigation Setting up a Computer Forensics Laboratory: Understanding the Requirements Computer Forensics and Steganography Relevance of the OSI 7 Layer Model to Computer Forensics Forensics and Social Networking Sites: The Security/Privacy Threats Computer Forensics from Compliance Perspective Challenges in Computer Forensics Special Tools and Techniques Forensics Auditing Antiforensics Forensics of Hand-Held Devices Introduction Understanding Cell Phone Working Characteristics Hand-Held Devices and Digital Forensics Toolkits for Hand-Held Device Forensics Forensics of iPods and Digital Music Devices An Illustration on Real Life Use of Forensics Techno-Legal Challenges with Evidence from Hand-Held Devices Organizational Guidelines on Cell Phone Forensics Cybersecurity: Organizational Implications Introduction Cost of Cybercrimes and IPR Issues: Lessons for Organizations Web Threats for Organizations: The Evils and Perils Security and Privacy Implications from Cloud Computing Social Media Marketing: Security Risks and Perils for Organizations Social Computing and the Associated Challenges for Organizations Protecting People's Privacy in the Organization Organizational Guidelines for Internet Usage, Safe Computing Guidelines and Computer Usage Policy Incident Handling: An Essential Component of Cybersecurity Forensics Best Practices for Organizations Media and Asset Protection: Best Practices for Organizations Importance of Endpoint Security in Organizations Cybercrime and Cyberterrorism: Social, Political, Ethical and Psychological Dimensions Introduction Intellectual Property in the Cyberspace The Ethical Dimension of Cybercrimes The Psychology, Mindset and Skills of Hackers and Other Cybercriminals Sociology of Cybercriminals Information Warfare: Perception or An Eminent Reality? Cybercrime: Illustrations, Examples and Mini-Cases Introduction Real-Life Examples Mini-Cases Illustrations of Financial Frauds in Cyber Domain Digital Signature-Related Crime Scenarios Digital Forensics Case Illustrations Online Scams Careers in Cybersecurity Introduction IT Security Organization Career Paths in Cybersecurity Cybersecurity Certifications Guide Path Index

Related Items

-

of

  • OFFER

    USA Immigration Guide, 5e

    Ramon Carrion

    Starts At

    1007.0

    1361.0

    26% OFF

  • OFFER

    The Politics of Personal Law in South Asia: Identity, Nationalism and the Uniform Civil Code

    S. Ghosh Partha

    Starts At

    542.0

    695.0

    22% OFF

  • OFFER

    Nuremberg: Infamy on Trial

    Joseph Persico

    Starts At

    2170.0

    2524.0

    14% OFF

  • OFFER

    Poetry, Politics and Culture: Essays on Indian Texts and Contexts

    Kumar Akshaya

    Starts At

    654.0

    850.0

    23% OFF

  • OFFER

    Southern Postcolonialisms: The Global South and the 'New' Literary Representations

    Satpathy Sumany

    Starts At

    651.0

    795.0

    18% OFF

  • OFFER

    Corporate Governance Values & Ethics With Case Studies

    Neeru Vasishth

    Starts At

    214.0

    275.0

    22% OFF

  • OFFER

    Scene of the Crime

    Malcolm Rose

    Starts At

    342.0

    450.0

    24% OFF

  • OFFER

    Regulation of Medical Products

    John Griffin

    Starts At

    7606.0

    8359.0

    9% OFF

  • OFFER

    Legal Aspects of Forensics

    Danielle S. Sapse

    Starts At

    2052.0

    2811.0

    27% OFF

  • Judicial Politics in New Democracies: Cases from Southern Africa (Challenge and Change in African Politics)

    Peter VonDoepp

    Starts At

    4763.0

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- Bag Empty

Your Bag is Empty!!

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : null Total Savings        : Grand Total :

Order Summary