You are on page 1of 2

Cyber Law and Information Security

` 299/-

The Cyber Law and Information Security book touches almost every important aspect of cyber law and need of information
security, such as what is cyber law and how is it used to deal with cyber crimes, fundamental concepts of e-commerce (including models and generations of e-commerce, advantages of e-commerce, e-governance and EDI, e-cash, e-payment, and security threats), ethical issues in data and software privacy, Internet security threats, digital signatures, information security, cryptography, VPN, and

Key Features:
Need of cyber law, objective and scope of the IT Act 2000, Indian Cyber Law, Uncitral Model Law u Intellectual property issues and cyber space, overview of intellectual property related to legislation in India, patents, copyrights, u trademarks, law related to semiconductor layout and design Fundamentals of e-commerce, security threats to e-commerce, virtual organization, business transactions on Web, e-governance u and EDI, concepts in electronic payment systems, e-cash, credit/debit cards, e-agreement, legal recognition of electronic and digital records, e-commerce, and issues of privacy Physical security and its need, disaster management and control, basic tenets of physical security, and physical entry controls u statements Access control, biometrics, factors in biometric system, criteria for selection of biometric, design issues in the biometric system, u interoperability issues, economic and social aspects, legal challenges Digital signatures and technical issues, legal issues, electronic records, digital contracts, requirements of the digital signature u system Cyber crime, cyber jurisdiction, cyber crime and evidence act, treatment of cyber crime in different countries, ethical issues in u data and software privacy, plagiarism, pornography, tampering computer documents Internet security threats such as hacking, cracking, viruses, trojan horse, malicious code, and logic bombs u Certifying authorities and their need, appointment, function of controller, generation, suspension, and revocation u Information systems and its importance, role of security in Internet and Web services, principles of information security, u classification of threats and attacks, security challenges, security implication for organizations Introduction to cryptography, issues in documents security, public key, private key, firewalls u Basic concepts of network security, perimeters of network protection and network attack, need of intrusion monitoring, and u detection VPN, tunneling VPN, types of VPN and their usage, security concerns in VPN u Concept of networking, IP addressing and subnetting, DNS, DHCP , bootp, active directory, IIS, NAT, WSUS, exchange server, ISA, u wireless network, and Mobile IP

ISBN: 978-93-5119-200-8 | Price: ` 299 | Pages: 252 | Authors: Faiyaz Ahamad, KLSI

This Book Covers:

t Fundamentals of Cyber Law E-Commerce t Digital Signatures t Investigation of Cyber Crime t Internet Security Threats t t Certifying Authorities Information Security t Cryptography t Basic Concepts of Network Security t Virtual Private Network (VPN) t Concept of Networking t

Table of Contents:
Fundamentals of Cyber Law:History of Internet | Introduction to Indian Cyber Law | Objective and Scope of the IT Act 2000 | Uncitral Model Law | ISP Guideline | Intellectual property issues | Overview of Intellectual property related legislation in India | Patent | Copyright | Trademark law | Law related to semiconductor layout and design | E Commerce: E-Commerce and its Models | Generations of E-commerce | Advantages of E-commerce | EDI | E-Cash and E-Payment Scheme | Business T r a n s a c t i o n s o n We b o r E - T r a n s a c t i o n | Credit/Debit/Smart Cards | E-Commerce in India | Recent Trends in Shopping | Mobile Commerce | EMarketplace Technology | E-Agreement | Legal Recognition of Electronic and Digital Records | Virtual Organisation | Security in E-Commerce: E-Commerce Issues of privacy | Security Threats to E Commerce | Physical Security | Spyware Technology | Access Control | Digital Signatures | Certificate Issuance | Investigation and Ethics: Cybercrime | Cyber/Resource Theft | Types of cyber crimes/frauds | Cyber frauds in India | Cyber jurisdiction | Dealing with cybercrime in various countries | Ethical issues in data and software privacy | Issues in ethical hacking | Internet security threats | Certifying authorities | Cyber crime forensic |

Information Security:Information Systems | Developing Information System | Principles of Information Security | An Overview of Information Security Management System (ISMS) |Classification of Threats and Attacks | Security Implication for Organisations | Information Classification and their Roles | Some other terms in Information Security | Stages of Vulnerability Management | Cr yptography: Understanding Cryptography and Encryption | Understanding Cryptographic Algorithms | Understanding Cryptanalysis | Describing Code Breaking Methodologies | Describing Cryptographic Attacks | Firewalls | Issues in Documents Security | Basic concepts of Network Security | Perimeters of Network protection and Network attack | Common Attacks | Need of Intrusion Monitoring and Detection | Honeypot | VPN | Networking: Concept of Networking | IP Addressing and Subnetting | Domain Name System(DNS) | Protocol | Services | Network Address Translation (NAT) | Server | Internet Security and Acceleration (ISA) | Wireless network | Ethernet | Fiber Distributed Data Interface(FDDI) | Client Server Model | Concurrency | Byte ordering | Network Socket | Zigbee | RAN | MANET |

About the Authors:

Faiyaz Ahamad is currently working as the Assistant Professor at the Department of Computer Science and Information Technology, Integral University, Lucknow (U.P.), India. Prof. Ahamad holds a Masters degree in Information Technology, and is also pursuing his Doctorate from the BBD University, Lucknow. His areas of interest include software engineering, software testing, software architecture, databases, data warehousing and mining, computer simulation and modeling, management information system, and SOA. He has more than 10 years of teaching experience and has also worked as a compliance officer. He did his training for two months in NTPC, Shakti Nagar, Sonebhadra, U.P. and has co-authored six publicationsAn Efficient and Scalable Design of Service Discovery Scheme for Wireless Mesh Network, A Language Independent Approach to Develop Urdu Stemmer, Secure Key Pre Distribution in Wireless Sensor Networks Using Combinatorial Design and Traversal Design Based Key Distribution, Scalable Design of Service Discovery Mechanism for Ad-hoc Network Using Wireless Mesh Network, Encrypting Data Using the Features of Mimetic Algorithm and Cryptography, and Service Discovery Mechanism for WLAN. The proficient teams at Kogent Learning Solutions Inc. and Dreamtech Press have seized the market of engineering textbooks, bringing excellent content in engineering and technical education to the fore. These teams are committed to providing excellence in the quality of content by judiciously analyzing the needs of their readers and ensuring dedication of their authors and editors in catering to these needs.
Published by:

19-A, Ansari Road, Daryaganj New Delhi-110 002, INDIA Tel: +91-11-2324 3463-73, Fax: +91-11-2324 3078 Email: Website:


4435-36/7, Ansari Road, Daryaganj New Delhi-110 002, INDIA Tel: +91-11-4363 0000, Fax: +91-11-2327 5895 Email: Website:

Exclusively Distributed by:

Regional Offices: Bangalore: Tel: +91-80-2313 2383, Fax: +91-80-2312 4319, Email: Mumbai: Tel: +91-22-2788 9263, 2788 9272, Telefax: +91-22-2788 9263, Email: Contact Persons: Raju Joseph: +91-9845065992 | Sandeep Rao: +91-9620215542 | Arun Kumar: +91-9611231170