Higher Education

shoe image

Cyber Security and Cyber Laws

Author(s): Alfred Basta | Nadine Basta | Mary Brown | Ravinder Kumar

ISBN: 9789387511675

1st Edition

Copyright: 2018

India Release: 2018

₹550

Binding: Paperback

Pages: 466

Trim Size: 241 x 181 mm

Refer Book

Order Inspection Copy

This book is written to provide a large number of options for further study to students who desire an accurate and interesting introduction to the fascinating realm of network security, primarily intended for II- or III-year students interested in information technology, network security, network engineering, and computer science. This work is designed to give students, professionals, and hobbyists accurate and well-researched examples of current security topics, bring IT professionals up-to-date on the latest security concepts, and provide value to the higher management.

The field of information security changes quickly, and this text is formulated to provide a solid foundation to enable the reader to understand and differentiate between hype and fact. The concepts and history of network development and network security as they have evolved are provided. This platform is anchored to real-world examples and techniques to glean the most useful information from the Internet. It bursts the mystique, shine a light on how and why people attack computer networks, and prepares the reader with the right techniques to begin winning the network security game.

  • Each chapter begins with a list of the concepts to be mastered for a quick reference and serves as a useful study aid.
  • Tips provide additional information, such as background information on a technology, mistakes to watch out for, or Web resources to obtain more information.
  • Each chapter contains a summary of the key content covered in the chapter, for reinforcing the main ideas.
  • All terms introduced in the chapter are gathered together as Key Terms at the end of the chapter, with a full definition.
  • The end-of-chapter assessment begins with review questions that reinforce the main concepts and techniques.
  • Hands-on Projects at the chapter end provide students with the ability to apply some of the concepts read in the chapter.

 

1. Ethics of Hacking and Cracking

2. Reconnaissance

3. Scanning Tools

4. Sniffers

5. TCP/IP Vulnerabilities

6. Encryption and Password Cracking

7. Spoofing

8. Session Hijacking

9. Hacking Network Devices

10. Trojan Horses

11. Denial-of-Service Attacks

12. Buffer Overflows

13. Programming Exploits

14. Mail Vulnerabilities

15. Web Application Vulnerabilities

16. Windows Vulnerabilities

17. UNIX/Linux Vulnerabilities

18. Incident Handling

19. Internet Law and Cyber Crimes

20. The Information Technology Act, 2000

 

Alfred Basta

Alfred Basta, PhD, is a professor of mathematics, cryptography, and information security as well as a professional speaker on Internet security, networking, and cryptography. He is member of many associations, including the Mathematical Association of America. Dr. Basta has published Mathematics for Information Technology, Linux Operations and Administration, and Database Security.

 

Nadine Basta

Nadine Basta, MS, is a professor of computer science, information technology, and security. Her numerous certifications include MCSE, MSDBA, CCDP, NCSE, NCTE, and CCA. A security consultant and auditor, she combines strong field experience with academic background. She is co-author of Mathematics for Information Technology and Linux Operations and Administration.

 

Mary Brown

Mary Brown, CISSP, CISA, PhD, is a professor who leads the information assurance and security and health informatics specializations at Capella University. She manages the curricula and works with the NSA to maintain Capella as a Center of Excellence. She is a member of numerous professional associations, including the Information Systems Security Association. She has published HIPAA Program Reference Handbook and Ethical Issues and Security Monitoring Trends in Global Healthcare: Technological Advancements.

 

Ravinder Kumar

Ravinder Kumar, PhD (HRM), is Professor at the Department of Commerce and Business Studies, Jamia Millia Islamia (a Central University), New Delhi. He has 21 years of teaching and post-doctoral research experience. He was Assoc. Prof. at Skyline College, Sharjah (UAE), in the Department of Business Administration, where he taught courses in accounting and international finance, accredited by National American University, USA. He was visiting faculty at the Indian Law Institute (a Deemed University), Delhi, and The Indian Institute of Foreign Trade, New Delhi. Working in the area of business and corporate law, he has authored books such as Legal and Regulatory Environment of Business, Business Law, and Auditing: Principles and Practice and published numerous researches in reputed journals. He has successfully supervised 6 PhD scholars.