Cryptography Network Security and Cyber Laws
Material type: TextLanguage: English Publication details: Delhi: Cengage Learning India Private Limited, 2018Description: 488ISBN:- 9789386858948
- 005.8 MEN
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
Reference Book | Alliance College of Engineering and Design | CSE & IT | 005.8 MEN (Browse shelf(Opens below)) | Not for loan | E14123 | |||
Book | Alliance College of Engineering and Design | CSE & IT | 005.8 MEN (Browse shelf(Opens below)) | Available | E14131 | |||
Book | Alliance College of Engineering and Design | CSE & IT | 005.8 MEN (Browse shelf(Opens below)) | Available | E14130 | |||
Book | Alliance College of Engineering and Design | CSE & IT | 005.8 MEN (Browse shelf(Opens below)) | Available | E14128 | |||
Book | Alliance College of Engineering and Design | CSE & IT | 005.8 MEN (Browse shelf(Opens below)) | Available | E14127 | |||
Book | Alliance College of Engineering and Design | CSE & IT | 005.8 MEN (Browse shelf(Opens below)) | Available | E14129 | |||
Book | Alliance College of Engineering and Design | CSE & IT | 005.8 MEN (Browse shelf(Opens below)) | Available | E14124 | |||
Book | Alliance College of Engineering and Design | CSE & IT | 005.8 MEN (Browse shelf(Opens below)) | Available | E14132 | |||
Book | Alliance College of Engineering and Design | CSE & IT | 005.8 MEN (Browse shelf(Opens below)) | Available | E14125 | |||
Book | Alliance College of Engineering and Design | CSE & IT | 005.8 MEN (Browse shelf(Opens below)) | Available | E14126 | |||
Book | Alliance School of Liberal Arts | 005.8 MEN (Browse shelf(Opens below)) | Available | LA01347 |
Hardly a month passes without a news splash on cyber security—be it a new virus strain, botnets, denial of service, or a high-profile break-in. Security was once the preserve of the military and, more recently, of banks. Today, awareness of security policy and practices has moved to the homes and offices of people at large. We are more dependent on the Internet than ever before—for banking, e-trading, e-commerce, and more. All of a sudden it seems like identity theft, phishing attacks, and spyware are everyone's concerns. Indeed, given the stakes involved, it is hardly surprising that many corporations worldwide have increased their spending on IT security over the last ten years.Risk analysis, security policy and management, compliance, etc., all come under the purview of security. This book, Cryptography, Network Security, and Cyber Laws, is principally about providing and understanding technological solutions to security. It is about the underlying vulnerabilities in systems, services, and communication protocols. It is about their exploitation and methods to defend against them.
There are no comments on this title.