Image from Google Jackets

Cryptography Network Security and Cyber Laws

By: By: Material type: TextTextLanguage: English Publication details: Delhi: Cengage Learning India Private Limited, 2018Description: 488ISBN:
  • 9789386858948
Subject(s): DDC classification:
  • 005.8 MEN
Summary: Hardly a month passes without a news splash on cyber security—be it a new virus strain, botnets, denial of service, or a high-profile break-in. Security was once the preserve of the military and, more recently, of banks. Today, awareness of security policy and practices has moved to the homes and offices of people at large. We are more dependent on the Internet than ever before—for banking, e-trading, e-commerce, and more. All of a sudden it seems like identity theft, phishing attacks, and spyware are everyone's concerns. Indeed, given the stakes involved, it is hardly surprising that many corporations worldwide have increased their spending on IT security over the last ten years.Risk analysis, security policy and management, compliance, etc., all come under the purview of security. This book, Cryptography, Network Security, and Cyber Laws, is principally about providing and understanding technological solutions to security. It is about the underlying vulnerabilities in systems, services, and communication protocols. It is about their exploitation and methods to defend against them.
List(s) this item appears in: New Arrivals for the Month of March 2023 - Computer Science and Data Science | New Arrivals for the Month of January 2024
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Reference Book Reference Book Alliance College of Engineering and Design CSE & IT 005.8 MEN (Browse shelf(Opens below)) Not for loan E14123
Book Book Alliance College of Engineering and Design CSE & IT 005.8 MEN (Browse shelf(Opens below)) Available E14131
Book Book Alliance College of Engineering and Design CSE & IT 005.8 MEN (Browse shelf(Opens below)) Available E14130
Book Book Alliance College of Engineering and Design CSE & IT 005.8 MEN (Browse shelf(Opens below)) Available E14128
Book Book Alliance College of Engineering and Design CSE & IT 005.8 MEN (Browse shelf(Opens below)) Available E14127
Book Book Alliance College of Engineering and Design CSE & IT 005.8 MEN (Browse shelf(Opens below)) Available E14129
Book Book Alliance College of Engineering and Design CSE & IT 005.8 MEN (Browse shelf(Opens below)) Available E14124
Book Book Alliance College of Engineering and Design CSE & IT 005.8 MEN (Browse shelf(Opens below)) Available E14132
Book Book Alliance College of Engineering and Design CSE & IT 005.8 MEN (Browse shelf(Opens below)) Available E14125
Book Book Alliance College of Engineering and Design CSE & IT 005.8 MEN (Browse shelf(Opens below)) Available E14126
Book Book Alliance School of Liberal Arts 005.8 MEN (Browse shelf(Opens below)) Available LA01347
Total holds: 0

Hardly a month passes without a news splash on cyber security—be it a new virus strain, botnets, denial of service, or a high-profile break-in. Security was once the preserve of the military and, more recently, of banks. Today, awareness of security policy and practices has moved to the homes and offices of people at large. We are more dependent on the Internet than ever before—for banking, e-trading, e-commerce, and more. All of a sudden it seems like identity theft, phishing attacks, and spyware are everyone's concerns. Indeed, given the stakes involved, it is hardly surprising that many corporations worldwide have increased their spending on IT security over the last ten years.Risk analysis, security policy and management, compliance, etc., all come under the purview of security. This book, Cryptography, Network Security, and Cyber Laws, is principally about providing and understanding technological solutions to security. It is about the underlying vulnerabilities in systems, services, and communication protocols. It is about their exploitation and methods to defend against them.

There are no comments on this title.

to post a comment.