WELCOME TO TECHNICAL PUBLICATIONS
You have no items in your shopping cart.
Close
Filters
Search

DECODE Cyber Security for B.Tech. JNTUH R16 (Open Elective offered by III-II ECE- CS6230E)

SKU: 9789333201179
I. A. Dhotre ISBN -9789333201179 Buy Kindle Edition Buy Printed Book
₹ 85.00
+ -

UNIT - I
Introduction to Cybercrime : Introduction, Cybercrime, and Information Security, Who are Cybercriminals, Classifications of Cybercrimes, And Cybercrime : The legal Perspectives and Indian Perspective, Cybercrime and the Indian ITA 2000, A Global Perspective on Cybercrimes. (Chapter-1)
UNIT - II
Cyber Offenses : How Criminals Plan Them : Introduction, How Criminals plan the Attacks, Social Engineering, Cyber stalking, Cyber cafe and Cybercrimes, Botnets: The Fuel for Cybercrime, Attack Vector, Cloud Computing. (Chapter-2)
UNIT - III
Cybercrime : Mobile and Wireless Devices : Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication service Security, Attacks on Mobile/Cell Phones, Mobile Devices : Security Implications for Organizations, Organizational Measures for Handling Mobile, Organizational Security Policies an Measures in Mobile Computing Era, Laptops. (Chapter-3)
UNIT - IV
Tools and Methods Used in Cybercrime : Introduction, Proxy Servers and Anonymizers, Phishing, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horse and Backdoors, Steganography, DoS and DDoS attacks, SQL Injection, Buffer Overflow. (Chapter-4)
UNIT - V
Cyber Security : Organizational Implications.
Introduction, Cost of Cybercrimes and IPR issues, Web threats for Organizations, Security and Privacy Implications, Social media marketing: Security Risks and Perils for Organizations, Social Computing and the associated challenges for Organizations. (Chapter-5)

 

UNIT - I
Introduction to Cybercrime : Introduction, Cybercrime, and Information Security, Who are Cybercriminals, Classifications of Cybercrimes, And Cybercrime : The legal Perspectives and Indian Perspective, Cybercrime and the Indian ITA 2000, A Global Perspective on Cybercrimes. (Chapter-1)
UNIT - II
Cyber Offenses : How Criminals Plan Them : Introduction, How Criminals plan the Attacks, Social Engineering, Cyber stalking, Cyber cafe and Cybercrimes, Botnets: The Fuel for Cybercrime, Attack Vector, Cloud Computing. (Chapter-2)
UNIT - III
Cybercrime : Mobile and Wireless Devices : Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication service Security, Attacks on Mobile/Cell Phones, Mobile Devices : Security Implications for Organizations, Organizational Measures for Handling Mobile, Organizational Security Policies an Measures in Mobile Computing Era, Laptops. (Chapter-3)
UNIT - IV
Tools and Methods Used in Cybercrime : Introduction, Proxy Servers and Anonymizers, Phishing, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horse and Backdoors, Steganography, DoS and DDoS attacks, SQL Injection, Buffer Overflow. (Chapter-4)
UNIT - V
Cyber Security : Organizational Implications.
Introduction, Cost of Cybercrimes and IPR issues, Web threats for Organizations, Security and Privacy Implications, Social media marketing: Security Risks and Perils for Organizations, Social Computing and the associated challenges for Organizations. (Chapter-5)

 

Write your own review
  • Only registered users can write reviews
  • Bad
  • Excellent