Académique Documents
Professionnel Documents
Culture Documents
he rapid growth of Information and Communication Technology (ICT) has raised the bar for the
security requirements also. Lots of data is received, stored, processed, and transmitted. Therefore,
its security is extremely important. The Information Security and Cyber Law book helps you to
understand the major aspects of information security, including information assurance, cybercrime,
threats to the security of information systems, risk assessment, and countermeasures. This book covers
details about the ways in which you can mitigate risks and overcome the issues that may cause harms to
an information systems security. The book also provides you knowledge of various laws, such as patent
law and copy right law, which have been constituted in the field of information security. Lots of
examples are included in this book in an easy-to-understand language, along with exercises at the end
of each unit.
SALIENT FEATURES:
u
Provides simple, clear and concise language, which makes the book easy and enjoyable for the
reader.
u
Follows a real-life application-based approach and provides examples wherever required.
u
Provides well-structured text and illustrative block diagrams and figures wherever needed.
u
Includes chapter objectives and advance organizer at the beginning of each chapter to describe
ISBN: 9789351194736 | Price: 299/- | Pages: 224 | Authors: Tripathi, Goel, Shukla, KLSI
TABLE OF CONTENTS:
Chapter 1: Introduction to Information Systems
and Security: Information Systems | Types of IS
| Development of IS | Introduction to Information
Security | Need for Information Security | Threats to
Information Systems | Information Assurance | Cyber
Security | Security Risk Analysis
Chapter 2: Introduction to Application Security
and Counter Measures: Introduction to Application
Security | Data Security Considerations | Security
Technologies | Security Threats | Security Threats to
E-Commerce | E-Cash and Electronic Payment
System | Credit/Debit/Smart Cards | Digital
Signature | Cryptography and Encryption
Chapter 3: Introduction to Security Measures:
S e c u re I n fo r m a t i o n Sys te m D eve l o p m e n t
/dtechpress
/dreamtechpress
Exclusively
Distributed by:
/company/dreamtech-press