Introduction to cybersecurity (Record no. 14336)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 05518nam a22001937a 4500 |
| 005 - DATE & TIME | |
| control field | 20260212135103.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 260212b |||||||| |||| 00| 0 eng d |
| 020 ## - ISBN | |
| International Standard Book Number | 9789393330314 |
| Price | 695.00 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | S.X.U.K |
| 041 ## - Language | |
| Language | English |
| 082 ## - DDC NUMBER | |
| Classification number | R 005.8 SIN(INT) |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Singh, Ajay |
| 245 ## - TITLE STATEMENT | |
| Title | Introduction to cybersecurity |
| Sub Title | : concepts, principles, technologies and practices |
| Statement of responsibility | Ajay Singh |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc | Kolkata |
| Name of publisher, distributor, etc | University press |
| Date of publication, distribution, etc | c2023 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Pages | 312p. |
| Other Details | P.B. |
| 500 ## - GENERAL NOTE | |
| General note | Preface<br/>Acknowledgements<br/>List of Tables<br/>List of Info Boxes<br/><br/>Chapter 1: Security in an Interconnected World<br/>Introduction to Information Systems | What is an Information System? | Evolution and Types of Information Systems | Evolution and Growth of the Internet | Information System Development and Maintenance | Cyberspace and Cybersecurity | What is Information Security? | Organization and Governance of the Internet and Cybersecurity | Information Security Models<br/><br/>Chapter 2: Cybercrime, Cyberattack Tools and Methods, Threat Sources and Cyber Offenders<br/>Introduction | What is a Cybercrime? | Classification of Cybercrimes | Forms of Cybercrimes | Cyber Scams and Frauds | Sources of Threats: Threat Actors and their Motivations | Tools and Methods Used in Cyberattacks/Cybercrimes | What is a Cyberattack? | Responding to Cyberattacks and the Cyber Kill Chain | Cyberattacks: Organizational Implications | Cyberattacks Impacting Citizens and Communities | Prevention of Cybercrime | International Efforts to Deal with Cybercrime | National Cybersecurity Policy | Online Code of Conduct and Computer Ethics<br/><br/>Chapter 3: Cybersecurity Vulnerabilities<br/>Introduction | Security Considerations and Challenges | Types of Vulnerabilities | Project OWASP | Vulnerabilities Assessment | Common Vulnerabilities and Exposures (CVE): Institutional Mechanisms<br/><br/>Chapter 4: Cybersecurity Management Practices<br/>Overview of Cybersecurity Management | Information Classification Process | Security Policies | Security Procedures and Guidelines | Security Controls | Security Organization | Incident Response | Business Continuity and Disaster Recovery<br/><br/>Chapter 5: Developing Secure Information Systems<br/>Introduction | Securing Information Assets | Data Security and Protection | Application Security | Security Architecture and Design | Security Issues in Hardware, Mobile Devices and Internet of Things | Network Security | Operating System Security | Database Security | User Management | Physical Security of IT Assets | Techniques/Methods for Data Security and Protection | Issues Related to Digital File Sharing<br/><br/>Chapter 6: Cybersecurity Strategies and Approaches<br/>Introduction | Information Security Governance and Risk Management | Cyber Risk Management | Cybersecurity Frameworks | Cyber Resilience | Industry-specific Cybersecurity Frameworks | The Human Factor in Cybersecurity | Algorithms and Techniques for Cybersecurity<br/><br/>Chapter 7: Cybersecurity Technologies<br/>Introduction | Securing Networks, Web Applications, Services and Servers | Email Security | Antivirus Technologies and Solutions | Identity and Access Management | Authentication | Cryptography | How Do Digital Money, Cryptocurrency and NFTs Work? | Digital Signatures | Advanced Technologies and Approaches in Cybersecurity | Internet Protocols and Ports<br/><br/>Chapter 8: Cyber Laws and Forensics<br/>Need for Cyber Laws and Regulations | Role of International Law and Governments | Challenges for Law-makers and Law Enforcement Agencies | Cybersecurity Regulations | Cyber Forensics | Cybercrime Techniques | Prevention of Cybercrime and Protection | Cybercrime Investigation | Evidence Collection and Analysis | Intellectual Property Issues in Cyberspace<br/><br/>Chapter 9: Personal Cybersecurity, Privacy and Data Protection<br/>Introduction | What is Personal Cybersecurity? | Common Causes of Personal Security Breaches | Personal Cybersecurity Best Practices | Privacy Regulations and Cybersecurity | The Role of Ethics in Cybersecurity<br/><br/>Chapter 10: Cybersecurity in Evolving Technology and Practice<br/>Introduction | Future Challenges in Cybersecurity | Web 3.0 | Harnessing Artificial Intelligence for Cybersecurity | Blockchain for Cybersecurity | Quantum Computing and Cybersecurity | Combating Advanced Persistent Threats | Digital Trust and Identity Management | 5G Networks and Cybersecurity | Adopting a ‘Secure-by-Design’ Approach | Supply Chain Cybersecurity | Other Evolving Aspects of Cybersecurity<br/><br/>Chapter 11: Cybersecurity in E-commerce and Digital Payments<br/>Introduction | What is E-commerce? | Elements of E-commerce Security | E-commerce Security Best Practices | Digital Payments | RBI Guidelines on Digital Payments and Customer Protection | Laws on Privacy and Data Protection for E-commerce Companies<br/><br/>Chapter 12: Overview of Social Media and Security<br/>Introduction to Social Networks | Types of Social Media and Popular Platforms | Social Media Marketing | Social Media Monitoring | Social Media Privacy | Social Media Privacy Laws and Personal Data Protection | Flagging and Reporting of Inappropriate Content | Laws Regarding Posting of Inappropriate Content | Data Harvesting and Personal Data Protection | Best Practices for the Use of Social Media<br/><br/>Annexure A: Cybercrime and Cyberattack Reporting in India<br/>Annexure B: 50 Significant Cyberattacks/Data Breaches: 2011–2021<br/>Annexure C: Self-Assessment Questions<br/>Annexure D: List of Abbreviations and Acronyms<br/>Index |
| 650 ## - Subject | |
| Subject | Computer Security |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | REFERENCE STATISTICS |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Koha collection | Location (home branch) | Sublocation or collection (holding branch) | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Serial Enumeration / chronology | Koha issues (times borrowed) | Koha full call number | Barcode (Accession No.) | Koha date last seen | Copy Number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Not For Loan | Reference | St. Xavier's University, Kolkata | St. Xavier's University, Kolkata | Reference Section | 02/12/2026 | K.M. Enterprise | 695.00 | S.X.U.K | R 005.8 SIN(INT) | US13910 | 02/12/2026 | 13910 | 02/12/2026 | REFERENCE STATISTICS | ||||
| Dewey Decimal Classification | St. Xavier's University, Kolkata | St. Xavier's University, Kolkata | Lending Section | 02/12/2026 | K.M. Enterprise | 695.00 | S.X.U.K | 005.8 SIN(INT) | S13911 | 02/12/2026 | 13911 | 02/12/2026 | STATISTICS | ||||||
| Dewey Decimal Classification | St. Xavier's University, Kolkata | St. Xavier's University, Kolkata | Lending Section | 02/12/2026 | K.M. Enterprise | 695.00 | S.X.U.K | 005.8 SIN(INT)C1 | S13912 | 02/12/2026 | 13912 | 02/12/2026 | STATISTICS |
