<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[St. Xavier's University Library Search for 'su:&quot;Computer Security &quot;']]> </title> <link> /cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20Security%20%22&#38;sort_by=relevance&#38;format=rss </link> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20Security%20%22&#38;sort_by=relevance&#38;format=rss"/> <description> <![CDATA[ Search results for 'su:&quot;Computer Security &quot;' at St. Xavier's University Library]]> </description> <opensearch:totalResults>5</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20Security%20%22&#38;sort_by=relevance&#38;format=opensearchdescription"/> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dsu%253A%2522Computer%2520Security%2520%2522" startPage="" /> <item> <title> Cyber strong : a primer on cyber risk management for business managers </title> <dc:identifier>ISBN:9789353885489</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=5633</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9353885485.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Singh, Ajay.<br /> New Delhi Sage 2021 .<br /> 261p , Includes index 9789353885489 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=5633">Place hold on <em>Cyber strong</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=5633</guid> </item> <item> <title> Introduction to computer security </title> <dc:identifier>ISBN:9788177584257</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=7455</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8177584251.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Bishop, Matt.<br /> Noida Pearson 2006 .<br /> xxix, 585 , An Overview of Computer Security Information and Network Security Policies Basic Cryptography Cipher Techniques Authentication Key Management Design Principles Representing Identity Access Control Mechanisms Introduction to Assurance Evaluating Systems Malicious Logic Vulnerability Analysis Auditing Intrusion Detection Network Security System Security User Security Program Security Lattices The Extended Euclidean Algorithm Virtual Machines Bibliography Index 9788177584257 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=7455">Place hold on <em>Introduction to computer security </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=7455</guid> </item> <item> <title> Cyber security issues affecting the online transaction </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=9036</link> <description> <![CDATA[ <p> By Baid, Anushka.<br /> Kolkata St.Xavier's University 2022 .<br /> 38p. , includes references, annexure </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=9036">Place hold on <em>Cyber security issues affecting the online transaction </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=9036</guid> </item> <item> <title> Network security essentials : applications and standards </title> <dc:identifier>ISBN:9789352866601</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=9852</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9352866606.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings, William .<br /> Noida Pearson 2018 .<br /> 461 , Includes index &amp; reference 9789352866601 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=9852">Place hold on <em>Network security essentials </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=9852</guid> </item> <item> <title> Introduction to cybersecurity : concepts, principles, technologies and practices </title> <dc:identifier>ISBN:9789393330314</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=14336</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/939333031X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Singh, Ajay.<br /> Kolkata University press 2023 .<br /> 312p. , Preface Acknowledgements List of Tables List of Info Boxes Chapter 1: Security in an Interconnected World Introduction to Information Systems | What is an Information System? | Evolution and Types of Information Systems | Evolution and Growth of the Internet | Information System Development and Maintenance | Cyberspace and Cybersecurity | What is Information Security? | Organization and Governance of the Internet and Cybersecurity | Information Security Models Chapter 2: Cybercrime, Cyberattack Tools and Methods, Threat Sources and Cyber Offenders Introduction | What is a Cybercrime? | Classification of Cybercrimes | Forms of Cybercrimes | Cyber Scams and Frauds | Sources of Threats: Threat Actors and their Motivations | Tools and Methods Used in Cyberattacks/Cybercrimes | What is a Cyberattack? | Responding to Cyberattacks and the Cyber Kill Chain | Cyberattacks: Organizational Implications | Cyberattacks Impacting Citizens and Communities | Prevention of Cybercrime | International Efforts to Deal with Cybercrime | National Cybersecurity Policy | Online Code of Conduct and Computer Ethics Chapter 3: Cybersecurity Vulnerabilities Introduction | Security Considerations and Challenges | Types of Vulnerabilities | Project OWASP | Vulnerabilities Assessment | Common Vulnerabilities and Exposures (CVE): Institutional Mechanisms Chapter 4: Cybersecurity Management Practices Overview of Cybersecurity Management | Information Classification Process | Security Policies | Security Procedures and Guidelines | Security Controls | Security Organization | Incident Response | Business Continuity and Disaster Recovery Chapter 5: Developing Secure Information Systems Introduction | Securing Information Assets | Data Security and Protection | Application Security | Security Architecture and Design | Security Issues in Hardware, Mobile Devices and Internet of Things | Network Security | Operating System Security | Database Security | User Management | Physical Security of IT Assets | Techniques/Methods for Data Security and Protection | Issues Related to Digital File Sharing Chapter 6: Cybersecurity Strategies and Approaches Introduction | Information Security Governance and Risk Management | Cyber Risk Management | Cybersecurity Frameworks | Cyber Resilience | Industry-specific Cybersecurity Frameworks | The Human Factor in Cybersecurity | Algorithms and Techniques for Cybersecurity Chapter 7: Cybersecurity Technologies Introduction | Securing Networks, Web Applications, Services and Servers | Email Security | Antivirus Technologies and Solutions | Identity and Access Management | Authentication | Cryptography | How Do Digital Money, Cryptocurrency and NFTs Work? | Digital Signatures | Advanced Technologies and Approaches in Cybersecurity | Internet Protocols and Ports Chapter 8: Cyber Laws and Forensics Need for Cyber Laws and Regulations | Role of International Law and Governments | Challenges for Law-makers and Law Enforcement Agencies | Cybersecurity Regulations | Cyber Forensics | Cybercrime Techniques | Prevention of Cybercrime and Protection | Cybercrime Investigation | Evidence Collection and Analysis | Intellectual Property Issues in Cyberspace Chapter 9: Personal Cybersecurity, Privacy and Data Protection Introduction | What is Personal Cybersecurity? | Common Causes of Personal Security Breaches | Personal Cybersecurity Best Practices | Privacy Regulations and Cybersecurity | The Role of Ethics in Cybersecurity Chapter 10: Cybersecurity in Evolving Technology and Practice Introduction | Future Challenges in Cybersecurity | Web 3.0 | Harnessing Artificial Intelligence for Cybersecurity | Blockchain for Cybersecurity | Quantum Computing and Cybersecurity | Combating Advanced Persistent Threats | Digital Trust and Identity Management | 5G Networks and Cybersecurity | Adopting a ‘Secure-by-Design’ Approach | Supply Chain Cybersecurity | Other Evolving Aspects of Cybersecurity Chapter 11: Cybersecurity in E-commerce and Digital Payments Introduction | What is E-commerce? | Elements of E-commerce Security | E-commerce Security Best Practices | Digital Payments | RBI Guidelines on Digital Payments and Customer Protection | Laws on Privacy and Data Protection for E-commerce Companies Chapter 12: Overview of Social Media and Security Introduction to Social Networks | Types of Social Media and Popular Platforms | Social Media Marketing | Social Media Monitoring | Social Media Privacy | Social Media Privacy Laws and Personal Data Protection | Flagging and Reporting of Inappropriate Content | Laws Regarding Posting of Inappropriate Content | Data Harvesting and Personal Data Protection | Best Practices for the Use of Social Media Annexure A: Cybercrime and Cyberattack Reporting in India Annexure B: 50 Significant Cyberattacks/Data Breaches: 2011–2021 Annexure C: Self-Assessment Questions Annexure D: List of Abbreviations and Acronyms Index 9789393330314 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=14336">Place hold on <em>Introduction to cybersecurity</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=14336</guid> </item> </channel> </rss>
