St. Xavier's University, Kolkata
Fr. Arrupe Central Library
Online Public Access Catalogue

Introduction to cybersecurity (Record no. 14336)

MARC details
000 -LEADER
fixed length control field 05518nam a22001937a 4500
005 - DATE & TIME
control field 20260212135103.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 260212b |||||||| |||| 00| 0 eng d
020 ## - ISBN
International Standard Book Number 9789393330314
Price 695.00
040 ## - CATALOGING SOURCE
Original cataloging agency S.X.U.K
041 ## - Language
Language English
082 ## - DDC NUMBER
Classification number R 005.8 SIN(INT)
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Singh, Ajay
245 ## - TITLE STATEMENT
Title Introduction to cybersecurity
Sub Title : concepts, principles, technologies and practices
Statement of responsibility Ajay Singh
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Kolkata
Name of publisher, distributor, etc University press
Date of publication, distribution, etc c2023
300 ## - PHYSICAL DESCRIPTION
Pages 312p.
Other Details P.B.
500 ## - GENERAL NOTE
General note Preface<br/>Acknowledgements<br/>List of Tables<br/>List of Info Boxes<br/><br/>Chapter 1: Security in an Interconnected World<br/>Introduction to Information Systems | What is an Information System? | Evolution and Types of Information Systems | Evolution and Growth of the Internet | Information System Development and Maintenance | Cyberspace and Cybersecurity | What is Information Security? | Organization and Governance of the Internet and Cybersecurity | Information Security Models<br/><br/>Chapter 2: Cybercrime, Cyberattack Tools and Methods, Threat Sources and Cyber Offenders<br/>Introduction | What is a Cybercrime? | Classification of Cybercrimes | Forms of Cybercrimes | Cyber Scams and Frauds | Sources of Threats: Threat Actors and their Motivations | Tools and Methods Used in Cyberattacks/Cybercrimes | What is a Cyberattack? | Responding to Cyberattacks and the Cyber Kill Chain | Cyberattacks: Organizational Implications | Cyberattacks Impacting Citizens and Communities | Prevention of Cybercrime | International Efforts to Deal with Cybercrime | National Cybersecurity Policy | Online Code of Conduct and Computer Ethics<br/><br/>Chapter 3: Cybersecurity Vulnerabilities<br/>Introduction | Security Considerations and Challenges | Types of Vulnerabilities | Project OWASP | Vulnerabilities Assessment | Common Vulnerabilities and Exposures (CVE): Institutional Mechanisms<br/><br/>Chapter 4: Cybersecurity Management Practices<br/>Overview of Cybersecurity Management | Information Classification Process | Security Policies | Security Procedures and Guidelines | Security Controls | Security Organization | Incident Response | Business Continuity and Disaster Recovery<br/><br/>Chapter 5: Developing Secure Information Systems<br/>Introduction | Securing Information Assets | Data Security and Protection | Application Security | Security Architecture and Design | Security Issues in Hardware, Mobile Devices and Internet of Things | Network Security | Operating System Security | Database Security | User Management | Physical Security of IT Assets | Techniques/Methods for Data Security and Protection | Issues Related to Digital File Sharing<br/><br/>Chapter 6: Cybersecurity Strategies and Approaches<br/>Introduction | Information Security Governance and Risk Management | Cyber Risk Management | Cybersecurity Frameworks | Cyber Resilience | Industry-specific Cybersecurity Frameworks | The Human Factor in Cybersecurity | Algorithms and Techniques for Cybersecurity<br/><br/>Chapter 7: Cybersecurity Technologies<br/>Introduction | Securing Networks, Web Applications, Services and Servers | Email Security | Antivirus Technologies and Solutions | Identity and Access Management | Authentication | Cryptography | How Do Digital Money, Cryptocurrency and NFTs Work? | Digital Signatures | Advanced Technologies and Approaches in Cybersecurity | Internet Protocols and Ports<br/><br/>Chapter 8: Cyber Laws and Forensics<br/>Need for Cyber Laws and Regulations | Role of International Law and Governments | Challenges for Law-makers and Law Enforcement Agencies | Cybersecurity Regulations | Cyber Forensics | Cybercrime Techniques | Prevention of Cybercrime and Protection | Cybercrime Investigation | Evidence Collection and Analysis | Intellectual Property Issues in Cyberspace<br/><br/>Chapter 9: Personal Cybersecurity, Privacy and Data Protection<br/>Introduction | What is Personal Cybersecurity? | Common Causes of Personal Security Breaches | Personal Cybersecurity Best Practices | Privacy Regulations and Cybersecurity | The Role of Ethics in Cybersecurity<br/><br/>Chapter 10: Cybersecurity in Evolving Technology and Practice<br/>Introduction | Future Challenges in Cybersecurity | Web 3.0 | Harnessing Artificial Intelligence for Cybersecurity | Blockchain for Cybersecurity | Quantum Computing and Cybersecurity | Combating Advanced Persistent Threats | Digital Trust and Identity Management | 5G Networks and Cybersecurity | Adopting a ‘Secure-by-Design’ Approach | Supply Chain Cybersecurity | Other Evolving Aspects of Cybersecurity<br/><br/>Chapter 11: Cybersecurity in E-commerce and Digital Payments<br/>Introduction | What is E-commerce? | Elements of E-commerce Security | E-commerce Security Best Practices | Digital Payments | RBI Guidelines on Digital Payments and Customer Protection | Laws on Privacy and Data Protection for E-commerce Companies<br/><br/>Chapter 12: Overview of Social Media and Security<br/>Introduction to Social Networks | Types of Social Media and Popular Platforms | Social Media Marketing | Social Media Monitoring | Social Media Privacy | Social Media Privacy Laws and Personal Data Protection | Flagging and Reporting of Inappropriate Content | Laws Regarding Posting of Inappropriate Content | Data Harvesting and Personal Data Protection | Best Practices for the Use of Social Media<br/><br/>Annexure A: Cybercrime and Cyberattack Reporting in India<br/>Annexure B: 50 Significant Cyberattacks/Data Breaches: 2011–2021<br/>Annexure C: Self-Assessment Questions<br/>Annexure D: List of Abbreviations and Acronyms<br/>Index
650 ## - Subject
Subject Computer Security
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type REFERENCE STATISTICS
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Koha collection Location (home branch) Sublocation or collection (holding branch) Shelving location Date acquired Source of acquisition Cost, normal purchase price Serial Enumeration / chronology Koha issues (times borrowed) Koha full call number Barcode (Accession No.) Koha date last seen Copy Number Price effective from Koha item type
    Dewey Decimal Classification   Not For Loan Reference St. Xavier's University, Kolkata St. Xavier's University, Kolkata Reference Section 02/12/2026 K.M. Enterprise 695.00 S.X.U.K   R 005.8 SIN(INT) US13910 02/12/2026 13910 02/12/2026 REFERENCE STATISTICS
    Dewey Decimal Classification       St. Xavier's University, Kolkata St. Xavier's University, Kolkata Lending Section 02/12/2026 K.M. Enterprise 695.00 S.X.U.K   005.8 SIN(INT) S13911 02/12/2026 13911 02/12/2026 STATISTICS
    Dewey Decimal Classification       St. Xavier's University, Kolkata St. Xavier's University, Kolkata Lending Section 02/12/2026 K.M. Enterprise 695.00 S.X.U.K   005.8 SIN(INT)C1 S13912 02/12/2026 13912 02/12/2026 STATISTICS
St. Xaviers University, Kolkata
St. Xavier's University, Kolkata ,Action Area III B, New Town, Kolkata - 700 160


OPAC Customized by Avior Technologies Private Limited
mail@aviortechnologies.co.in