Advance cyber security / Manmohan Singh [and three others]
Material type:
- text
- unmediated
- volume
- 9781774695333
- 005.8
Item type | Current library | Collection | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Lagro Branch Reference Section | Reference | R 005.8 Si617a 2023 (Browse shelf(Opens below)) | c. 3 | Room use only | 57929QC | |
![]() |
Main Library Reference Section | Reference | R 005.8 Si617a 2023 (Browse shelf(Opens below)) | c. 1 | Room use only | 57927QC |
Browsing Cubao Branch shelves, Shelving location: Reference Section, Collection: Reference Close shelf browser (Hides shelf browser)
R 005.743 F967b 2024 Beginning Power BI for business users : learning to turn data into insights | R 005.76 P913c 2012 Concepts of database management | R 005.8 R351d 2023 Data governance for dummies | R 005.8 Si617a 2023 Advance cyber security | R 006.66 Si617c 2023 Computer graphics science | R 006.74 V872h 2016 HTML5 and CSS3 complete | R 006.74 W629b 2003 Basic HTML |
Includes index.
Chapter I. Introduction to cybercrime
Computer crime
Unauthorized access
History of cybercrime
Categories of cybercrime
Types of cybercrime
Cybercrime in modern society
Chapter 2. System vulnerabilities
Network vulnerabilities
Key actions
Web application vulnerability (OWASP 10)
Chapter 3. Network security
Firewall
Types of firewall
DMZ
IP addressing scheme
Authentication, authorization, and accounting
Honey pot
Intrusion detection and prevention system
Virtual Private Network (VPN)
VPN security
Network Address Translation (NAT) and port forwarding
Chapter 4. Cyber forensics
In-house investigation
Lifecycle : digital forensics
Issues facing computer forensics
Digital forensics laboratory usages
Special purpose forensics workstation
Basic customized forensic workstation
Stocking hardware peripherals
Computer forensics tools
Chapter 5. IR - incident response
Understanding the cyber security incident
Conducting triage
Carrying out first response
Performing initial analysis
Containing the cyber security incident
Eradicating the cause of the incident
Gathering and preserving evidence
Recover systems, data, and connectivity back to normal
Chapter 6. Online safety and precautions
E-mail scams safety precautions
Securing your computer from cybercrime attacks
Staying safe on social media
Social media safety precautions
Exercising caution when shopping online
Safety installation of application
Prevent spyware from getting onto your computer
Protect your identity online
Golden rules for online safety
Practical approach
There are no comments on this title.