MARC details
000 -LEADER |
fixed length control field |
03407nam a22002417a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
VITAP |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230321122847.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230321b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9789387511675 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
VITAP |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
23rd Ed., |
Classification number |
005.8 BAS |
245 ## - TITLE STATEMENT |
Title |
Cyber Security and Cyber Crimes / |
Statement of responsibility, etc. |
Alfred Basta and ...[et al] |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Delhi |
Name of publisher, distributor, etc. |
Cengage Learning India Pvt. Ltd. |
Date of publication, distribution, etc. |
2018 |
300 ## - PHYSICAL DESCRIPTION |
Other physical details |
xxiii, 442p. : ill. ; |
Dimensions |
24cm |
500 ## - GENERAL NOTE |
General note |
Overview:<br/><br/><br/>This book is written to provide a large number of options for further study to students who desire an accurate and interesting introduction to the fascinating realm of network security, primarily intended for II- or III-year students interested in information technology, network security, network engineering, and computer science. This work is designed to give students, professionals, and hobbyists accurate and well-researched examples of current security topics, bring IT professionals up-to-date on the latest security concepts, and provide value to the higher management.<br/><br/>The field of information security changes quickly, and this text is formulated to provide a solid foundation to enable the reader to understand and differentiate between hype and fact. The concepts and history of network development and network security as they have evolved are provided. This platform is anchored to real-world examples and techniques to glean the most useful information from the Internet. It bursts the mystique, shine a light on how and why people attack computer networks, and prepares the reader with the right techniques to begin winning the network security game.<br/><br/>Features:<br/><br/> Each chapter begins with a list of the concepts to be mastered for a quick reference and serves as a useful study aid.<br/> Tips provide additional information, such as background information on a technology, mistakes to watch out for, or Web resources to obtain more information.<br/> Each chapter contains a summary of the key content covered in the chapter, for reinforcing the main ideas.<br/> All terms introduced in the chapter are gathered together as Key Terms at the end of the chapter, with a full definition.<br/> The end-of-chapter assessment begins with review questions that reinforce the main concepts and techniques.<br/> Hands-on Projects at the chapter end provide students with the ability to apply some of the concepts read in the chapter.<br/><br/>Table of Contents:<br/>1. Ethics of Hacking and Cracking<br/><br/>2. Reconnaissance<br/><br/>3. Scanning Tools<br/><br/>4. Sniffers<br/><br/>5. TCP/IP Vulnerabilities<br/><br/>6. Encryption and Password Cracking<br/><br/>7. Spoofing<br/><br/>8. Session Hijacking<br/><br/>9. Hacking Network Devices<br/><br/>10. Trojan Horses<br/><br/>11. Denial-of-Service Attacks<br/><br/>12. Buffer Overflows<br/><br/>13. Programming Exploits<br/><br/>14. Mail Vulnerabilities<br/><br/>15. Web Application Vulnerabilities<br/><br/>16. Windows Vulnerabilities<br/><br/>17. UNIX/Linux Vulnerabilities<br/><br/>18. Incident Handling<br/><br/>19. Internet Law and Cyber Crimes<br/><br/>20. The Information Technology Act, 2000 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
11136 |
Topical term or geographic name entry element |
Computer crimes; Computer crimes--Law and legislation; Computer security |
700 ## - ADDED ENTRY--PERSONAL NAME |
9 (RLIN) |
11137 |
Personal name |
Basta, Alfred |
700 ## - ADDED ENTRY--PERSONAL NAME |
9 (RLIN) |
11138 |
Personal name |
Basta, Nadine |
700 ## - ADDED ENTRY--PERSONAL NAME |
9 (RLIN) |
11139 |
Personal name |
Brown, Mary |
700 ## - ADDED ENTRY--PERSONAL NAME |
9 (RLIN) |
11140 |
Personal name |
Kumar, Ravinder |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://www.cengage.co.in/book-list/print/cyber-security-and-cyber-laws-t0">https://www.cengage.co.in/book-list/print/cyber-security-and-cyber-laws-t0</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Text Book |
Edition |
23rd |
Classification part |
005.8 |
Call number suffix |
BAS |