Cyber Security and Cyber Crimes / (Record no. 44806)

MARC details
000 -LEADER
fixed length control field 03407nam a22002417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field VITAP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230321122847.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230321b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789387511675
040 ## - CATALOGING SOURCE
Transcribing agency VITAP
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23rd Ed.,
Classification number 005.8 BAS
245 ## - TITLE STATEMENT
Title Cyber Security and Cyber Crimes /
Statement of responsibility, etc. Alfred Basta and ...[et al]
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Delhi
Name of publisher, distributor, etc. Cengage Learning India Pvt. Ltd.
Date of publication, distribution, etc. 2018
300 ## - PHYSICAL DESCRIPTION
Other physical details xxiii, 442p. : ill. ;
Dimensions 24cm
500 ## - GENERAL NOTE
General note Overview:<br/><br/><br/>This book is written to provide a large number of options for further study to students who desire an accurate and interesting introduction to the fascinating realm of network security, primarily intended for II- or III-year students interested in information technology, network security, network engineering, and computer science. This work is designed to give students, professionals, and hobbyists accurate and well-researched examples of current security topics, bring IT professionals up-to-date on the latest security concepts, and provide value to the higher management.<br/><br/>The field of information security changes quickly, and this text is formulated to provide a solid foundation to enable the reader to understand and differentiate between hype and fact. The concepts and history of network development and network security as they have evolved are provided. This platform is anchored to real-world examples and techniques to glean the most useful information from the Internet. It bursts the mystique, shine a light on how and why people attack computer networks, and prepares the reader with the right techniques to begin winning the network security game.<br/><br/>Features:<br/><br/> Each chapter begins with a list of the concepts to be mastered for a quick reference and serves as a useful study aid.<br/> Tips provide additional information, such as background information on a technology, mistakes to watch out for, or Web resources to obtain more information.<br/> Each chapter contains a summary of the key content covered in the chapter, for reinforcing the main ideas.<br/> All terms introduced in the chapter are gathered together as Key Terms at the end of the chapter, with a full definition.<br/> The end-of-chapter assessment begins with review questions that reinforce the main concepts and techniques.<br/> Hands-on Projects at the chapter end provide students with the ability to apply some of the concepts read in the chapter.<br/><br/>Table of Contents:<br/>1. Ethics of Hacking and Cracking<br/><br/>2. Reconnaissance<br/><br/>3. Scanning Tools<br/><br/>4. Sniffers<br/><br/>5. TCP/IP Vulnerabilities<br/><br/>6. Encryption and Password Cracking<br/><br/>7. Spoofing<br/><br/>8. Session Hijacking<br/><br/>9. Hacking Network Devices<br/><br/>10. Trojan Horses<br/><br/>11. Denial-of-Service Attacks<br/><br/>12. Buffer Overflows<br/><br/>13. Programming Exploits<br/><br/>14. Mail Vulnerabilities<br/><br/>15. Web Application Vulnerabilities<br/><br/>16. Windows Vulnerabilities<br/><br/>17. UNIX/Linux Vulnerabilities<br/><br/>18. Incident Handling<br/><br/>19. Internet Law and Cyber Crimes<br/><br/>20. The Information Technology Act, 2000
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 11136
Topical term or geographic name entry element Computer crimes; Computer crimes--Law and legislation; Computer security
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 11137
Personal name Basta, Alfred
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 11138
Personal name Basta, Nadine
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 11139
Personal name Brown, Mary
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 11140
Personal name Kumar, Ravinder
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www.cengage.co.in/book-list/print/cyber-security-and-cyber-laws-t0">https://www.cengage.co.in/book-list/print/cyber-security-and-cyber-laws-t0</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Text Book
Edition 23rd
Classification part 005.8
Call number suffix BAS
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type Public note Checked out Date last checked out Total Renewals
    Dewey Decimal Classification Paper Back   Not For Loan Reference School of Computer Science Section VIT-AP General Stacks 2023-03-16 Bookionics 525.00 SBH/19082   005.8 BAS 019794 2023-03-21 525.00 2023-03-21 Reference Book CSE      
    Dewey Decimal Classification Paper Back       School of Computer Science Section VIT-AP General Stacks 2023-03-16 Bookionics 525.00 SBH/19082 9 005.8 BAS 019795 2025-03-15 525.00 2023-03-21 Text Book CSE 2025-09-11 2025-03-15  
    Dewey Decimal Classification Paper Back       School of Computer Science Section VIT-AP General Stacks 2023-03-16 Bookionics 525.00 SBH/19082 10 005.8 BAS 019796 2025-03-16 525.00 2023-03-21 Text Book CSE   2025-02-19 2
    Dewey Decimal Classification Paper Back       School of Computer Science Section VIT-AP General Stacks 2023-03-16 Bookionics 525.00 SBH/19082 7 005.8 BAS 019797 2025-03-15 525.00 2023-03-21 Text Book CSE   2024-10-28  

Visitor Number:

Powered by Koha