Sailing safe in cyberspace protect your identity and data
Looking at safe computing, this text gives in-depth exposure to the various ways in which security of information on computers might be compromised, how cyber crime markets work and measures to ensure safety at individual and organizational levels.
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New Delhi
Sage Publications
2013.
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | HV 8079 .C65 .K38 2013 |
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 98904 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220023006.0 | ||
| 008 | 141014s2013 ii a b 000 0 eng d | ||
| 020 | |a 9788132111221 (pbk. : alk. paper) | ||
| 020 | |a 8132111222 (pbk. : alk. paper) | ||
| 039 | 9 | |a 201501141417 |b zul |c 201410201606 |d shahrim |y 201410141148 |z syarifuddin | |
| 040 | |a UPNM | ||
| 090 | |a HV 8079 .C65 |b .K38 2013 | ||
| 100 | 1 | |a Kaushik, Anjali | |
| 245 | 1 | 0 | |a Sailing safe in cyberspace |b protect your identity and data |c Anjali Kaushik. |
| 260 | |a New Delhi |b Sage Publications |c 2013. | ||
| 300 | |a xxiii, 268 p. |b ill. |c 24 cm. | ||
| 504 | |a Includes bibliographical references. | ||
| 505 | 0 | |a Preface -- I: MOTIVATION AND TYPES OF CYBERCRIME -- Introduction -- Identifying Cybercrime Motives -- How Can You Be Affected by Cybercrime -- II: THREATS AND METHODS -- Spam Methods -- Malware Tools -- Phishing Ways -- Identity Theft Methods -- Denial-of-Service Attack -- Damage by Botnets -- Hacking and Structured Query Language Injection-- Social Engineering Techniques -- Newer Threats -- III: IMPACT, TRENDS AND ROLE OF GOVERNMENT IN COMBATING CYBERCRIME -- Impact of Cybercrime -- Trends in Cybercrime -- Role of Government and Regulatory Mechanisms -- IV: BEING SAFE, BEING CYBER SECURE -- Sailing Safe -- Suggestions for Building a Security Program and Concluding Remarks -- Bibliography. | |
| 520 | |a Looking at safe computing, this text gives in-depth exposure to the various ways in which security of information on computers might be compromised, how cyber crime markets work and measures to ensure safety at individual and organizational levels. | ||
| 592 | |a 00013231 |b 19/06/2014 |c RM92.94 |h PVK | ||
| 650 | 0 | |a Computer crimes |x Prevention. | |
| 650 | 0 | |a Computer security |x Government policy. | |
| 650 | 0 | |a Computer crimes |x Prevention |x Government policy. | |
| 999 | |a vtls000053005 |c 98904 |d 98904 | ||


