Description
Written in an easy and descriptive manner, the Cyber Law and Information Security book touches almost every important aspect of cyber law and need of information security, such as what is cyber law and how is it used to deal with cyber crimes, fundamental concepts of e-commerce (including models and generations of e-commerce, advantages of e-commerce, e-governance and EDI, e-cash, e-payment, and security threats), ethical issues in data and software privacy, Internet security threats, digital signatures, information security, cryptography, VPN, and networking. The book provides lots of examples in an easy-to-understand language along with exercises at the end of each chapter.
The book covers:
- E-Commerce
- Digital Signatures
- Investigation of Cyber Crime
- Internet Security Threats
- Certifying Authorities
- Information Security
- Cryptography
- Basic Concepts of Network
- Virtual Private Network (VPN)
- Concept of Networking
- Fundamentals of Cyber Law
Faiyaz Ahamad is currently working as the Assistant Professor at the Department of Computer Science and Information Technology, Integral University, Lucknow (U.P.), India. Prof. Ahamad holds a Masters degree in Information Technology, and is also pursuing his Doctorate from the BBD University, Lucknow. His areas of interest include software engineering, software testing, software architecture, databases, data warehousing and mining, computer simulation and modeling, management information system, and SOA.
.
He has more than 10 years of teaching experience and has also worked as a compliance officer. He did his training for two months in NTPC, Shakti Nagar, Sonebhadra, U.P. and has co-authored six publications—An Efficient and Scalable Design of Service Discovery Scheme for Wireless Mesh Network, A Language Independent Approach to Develop Urdu Stemmer, Secure Key Pre Distribution in Wireless Sensor Networks Using Combinatorial Design and Traversal Design Based Key Distribution, Scalable Design of Service Discovery Mechanism for Ad-hoc Network Using Wireless Mesh Network, Encrypting Data Using the Features of Mimetic Algorithm and Cryptography, and Service Discovery Mechanism for WLAN..
.
The proficient teams at Kogent Learning Solutions Inc. and Dreamtech Press have seized the market of engineering textbooks, bringing excellent content in engineering and technical education to the fore. These teams are committed to providing excellence in the quality of content by judiciously analyzing the needs of their readers and ensuring dedication of their authors and editors in catering to these needs.