Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Cyber Law and Information Security

Cyber Law and Information Security

Ratings: (0)|Views: 82|Likes:
Published by Dreamtech Press
Cyber Law and Information Security
Cyber Law and Information Security

More info:

Published by: Dreamtech Press on Sep 09, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/03/2013

pdf

text

original

 
KeyFeatures:
uuuuuuuuuuuuuu
Needofcyberlaw,objectiveandscopeoftheITAct2000,IndianCyberLaw,UncitralModelLawIntellectualpropertyissuesandcyberspace,overviewofintellectualpropertyrelatedtolegislationinIndia,patents,copyrights,trademarks,lawrelatedtosemiconductorlayoutanddesignFundamentalsofe-commerce,securitythreatstoe-commerce,virtualorganization,businesstransactionsonWeb,e-governanceand EDI, concepts in electronic payment systems, e-cash, credit/debit cards, e-agreement, legal recognition of electronic anddigitalrecords,e-commerce,andissuesofprivacyPhysicalsecurityanditsneed,disastermanagementandcontrol,basictenetsofphysicalsecurity,andphysicalentrycontrolsstatementsAccesscontrol,biometrics,factorsinbiometricsystem,criteriaforselectionofbiometric,designissuesinthebiometricsystem,interoperabilityissues,economicandsocialaspects,legalchallengesDigital signatures and technical issues, legal issues, electronic records, digital contracts, requirements of the digital signaturesystemCyber crime, cyber jurisdiction, cyber crime and evidence act, treatment of cyber crime in different countries, ethical issues indataandsoftwareprivacy,plagiarism,pornography,tamperingcomputerdocumentsInternetsecuritythreatssuchashacking,cracking,viruses,trojanhorse,maliciouscode,andlogicbombsCertifyingauthoritiesandtheirneed,appointment,functionofcontroller,generation,suspension,andrevocationInformationsystemsanditsimportance,roleofsecurityinInternetandWebservices,principlesofinformationsecurity,classificationofthreatsandattacks,securitychallenges,securityimplicationfororganizationsIntroductiontocryptography,issuesindocumentssecurity,publickey,privatekey,firewallsBasicconceptsofnetworksecurity,perimetersofnetworkprotectionandnetworkattack,needofintrusionmonitoring,anddetectionVPN,tunnelingVPN,typesofVPNandtheirusage,securityconcernsinVPNConceptofnetworking,IPaddressingandsubnetting,DNS,DHCP,bootp,activedirectory,IIS,NAT,WSUS,exchangeserver,ISA,wirelessnetwork,andMobileIP
ISBN:
978-93-5119-200-8
| Price:
`
299
| Pages:
252
| Authors:
Faiyaz Ahamad, KLSI
T
he Cyber Law and Information Security
book touches almost every important aspect of cyber law and need of informationsecurity, such as what is cyber law and how is it used to deal with cyber crimes, fundamental concepts of e-commerce (includingmodelsandgenerationsofe-commerce,advantagesofe-commerce,e-governanceandEDI,e-cash,e-payment,andsecuritythreats),ethicalissuesindataandsoftwareprivacy,Internetsecuritythreats,digitalsignatures,informationsecurity,cryptography,VPN,and
`
299/-
`
299/-
Cyber Law and InformationSecurityCyber Law and InformationSecurity

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->