Experience reading like never before
Sign in to continue reading.
Discover and read thousands of books from independent authors across India
Visit the bookstore"It was a wonderful experience interacting with you and appreciate the way you have planned and executed the whole publication process within the agreed timelines.”
Subrat SaurabhAuthor of Kuch Woh PalDr Padmavathi Ganapathi is the Dean-School of Physical Sciences and Computational Sciences and Professor in the Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women (Deemed to be University), Coimbatore. She has more than 34 years of teaching experience and 26 years of research experience. Her areas of interest include Cyber Security, Wireless Communication and Real Time Systems. She has executed funded projects worth 267.368 lakhs Sponsored by AICTE, UGC, DRDO and DST. Supervised 22 scholars at Ph.D level, she has more than 200 publications Read More...
Dr Padmavathi Ganapathi is the Dean-School of Physical Sciences and Computational Sciences and Professor in the Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women (Deemed to be University), Coimbatore. She has more than 34 years of teaching experience and 26 years of research experience. Her areas of interest include Cyber Security, Wireless Communication and Real Time Systems. She has executed funded projects worth 267.368 lakhs Sponsored by AICTE, UGC, DRDO and DST. Supervised 22 scholars at Ph.D level, she has more than 200 publications in Prestigious conferences and peer-reviewed journals. She is the life members of various professional bodies like CSI, ISTE, ISCA, WSEAS, AACE and AICW. Reviewer for many IEEE Conferences and Journals. She has visited many countries for technical deliberations. She is the Course Co-ordinator for SWAYAM-MOOC on Cyber Security. So far, more than 96, 000 learners have enrolled for various sessions and benefitted. She has authored 10 books in Cyber Security and Data Science Domain.
Vidwan Profile Page: https://vidwan.inflibnet.ac.in/profile/132327
Read Less...Achievements
This book titled “Security Auditing with NMAP” is primarily intends to provide a comprehensive view about the process of security auditing, importance, need, types, auditing standards and procedures for auditing. The main objective of this book is to analyse various security risks in a network and perform auditing methods that help to protect critical data, identify security loopholes, create new security policies and track the effectiveness of sec
This book titled “Security Auditing with NMAP” is primarily intends to provide a comprehensive view about the process of security auditing, importance, need, types, auditing standards and procedures for auditing. The main objective of this book is to analyse various security risks in a network and perform auditing methods that help to protect critical data, identify security loopholes, create new security policies and track the effectiveness of security strategies. This book further focuses on an open-source utility tool for network discovery and security auditing, called NMAP. NMAP is one of the important tools in Kali Linux platform for information security tasks. It uses IP packets to determine the hosts available on a network and their services, operating systems and versions, types of packet filters, firewalls and so on. This book facilitates the user to audit the network with various commands and allows a large number of scanning techniques, such as UDP, TCP connect (), TCP SYN (half-open), and FTP. It also offers a wide variety of scan types, including Proxy (bounce attack), ICMP (ping sweep), FIN, ACK sweep, SYN sweep, IP Protocol, and Null scan. It is a useful learning material for students and working professionals who would like to start their career in cyber security audit domain.
Cyber Crime Administration is one of the skill enhancement courses prescribed for B.A (Honours) in Public Administration. Cyber Crime Administration course particularly focuses on developing skills and proficiencies suitable for a Public Administrator. A Public Administrator needs to learn the legal and policy development in cyber space by acquiring necessary knowledge and skills for prevention and handling of cyber crimes in an organization. Cyber Crime Admin
Cyber Crime Administration is one of the skill enhancement courses prescribed for B.A (Honours) in Public Administration. Cyber Crime Administration course particularly focuses on developing skills and proficiencies suitable for a Public Administrator. A Public Administrator needs to learn the legal and policy development in cyber space by acquiring necessary knowledge and skills for prevention and handling of cyber crimes in an organization. Cyber Crime Administration is an Under Graduate level online course offered under SWAYAM platform.
This material is useful for every citizen to know about their rights and offensive activities according to cyber law and also the legal implications of cyber crime administration. It is useful for public administrators, cyber security specialists, lawyers and cyber crime officers to explore the cyber regulations and policies.
Cyber Attacks and Cyber Crimes are increasing tremendously due to the growth of technology day by day. On one hand, technology provides a faster development and solution for many industrial demands. On the other hand, the cyber criminals are in search of loopholes in the systems with information and communication technologies to steal the authentic information without the knowledge of the user. Cyber crimes are committed with the help of technology and cyber c
Cyber Attacks and Cyber Crimes are increasing tremendously due to the growth of technology day by day. On one hand, technology provides a faster development and solution for many industrial demands. On the other hand, the cyber criminals are in search of loopholes in the systems with information and communication technologies to steal the authentic information without the knowledge of the user. Cyber crimes are committed with the help of technology and cyber crimes are punishable according to cyber law. Cyber law and its associated cyber acts and sections pave the way to identify the criminal activities. Information Technology Act 2000 and its amendments provide the legal framework to handle cyber crimes. The book on “Cyber Law” deals with evolution of cyber law, ethical concerns, cyber policies, cyber strategies, Information Technology Act 2000, Amendment of Information Technology Act 2008, evidentiary value of E-Mail / SMS, Cyber crimes and offences dealt with IPC, Intellectual Property Rights in India, Anti – Money Laundering Act and comparison among various cyber laws. This material is useful for every citizen to know about their rights and offensive activities according to cyber law. It is also useful for cyber security specialists, lawyers and cyber crime officers to explore the cyber regulations and policies. This material can also be used to create awareness among the public about the legal implications of certain activities in cyber space.
The book on “Digital Forensics and Investigation Methods” deals with the analysis of digital forensics and the associated investigation methods. We are all living in digital era. On one hand, technology simplifies the daily chores and improves the quality of life of human. On the other hand, cyber crimes are on the raise. Criminals operate more safely and smartly in the digital era. They have changed their landscape of operations. Finding the evide
The book on “Digital Forensics and Investigation Methods” deals with the analysis of digital forensics and the associated investigation methods. We are all living in digital era. On one hand, technology simplifies the daily chores and improves the quality of life of human. On the other hand, cyber crimes are on the raise. Criminals operate more safely and smartly in the digital era. They have changed their landscape of operations. Finding the evidence from digital media, preserving them and documenting the same need scientific and systematic approach. Forensic team must be exposed to the best techniques and tools to handle the cyber crimes and complicated digital based cases. This book focuses on the concept of digital forensics, different types of digital forensics, digital forensic investigation methods, tools used for digital forensics investigation, report writing and management of evidence. It also briefly explains the various digital forensics investigation models and the process involved in digital forensics analysis. This material will be useful to digital forensic investigation officers, students and working professionals to develop an interest in the domain. It is a useful material for cyber crime investigation team to tackle the cases promptly.
The book on “Cyber Crimes and Investigation Methods” deals with the cyber crimes, cyber frauds and analysis of cybercrime based on human behavior. In this digital era, technology upliftments are expanded worldwide and also it paves way for cyber crimes. Detecting cyber crimes, attacks and cyber related frauds are need of the hour to safeguard the individual’s personal and financial credentials and also the organization’s privacy policie
The book on “Cyber Crimes and Investigation Methods” deals with the cyber crimes, cyber frauds and analysis of cybercrime based on human behavior. In this digital era, technology upliftments are expanded worldwide and also it paves way for cyber crimes. Detecting cyber crimes, attacks and cyber related frauds are need of the hour to safeguard the individual’s personal and financial credentials and also the organization’s privacy policies. Cyber crime analysis helps to analyze the human behavior and its associated characteristics to determine the source of cybercrimes and frauds vigilantly. Criminal Profiling and Psychological Profiling are the major areas in identifying the cyber crimes based on the criminal profiles. This book focuses on the concept of cyber crime, classification of cyber crimes, different types of cyber crimes, analysis of crimes, analysis of Human Behavior, criminal signature, stylometry, incident handling, cyber crime investigation methods, criminal profiling, psychological profiling and cyber trail. This material acts as a ready reckoner to explore the various kinds of cyber crimes, frauds, significance of cyber crime analysis, criminal signature, modus operandi, stylometry analysis, criminal and psychological profiling. It is a useful material for the cyber crime investigation officers to handle cyber criminals.
The book on “Virtual Currency – Blockchain Technology – Security Auditing” deals with the importance of virtual currency, Blockchain technology and security auditing concepts. Today, virtual currency plays a vital role in share market and foreign exchange. Blockchain technology is a major revolution to store transactional records in a network with enhanced security features. Security auditing is one of the necessary practices of an orga
The book on “Virtual Currency – Blockchain Technology – Security Auditing” deals with the importance of virtual currency, Blockchain technology and security auditing concepts. Today, virtual currency plays a vital role in share market and foreign exchange. Blockchain technology is a major revolution to store transactional records in a network with enhanced security features. Security auditing is one of the necessary practices of an organization to ensure security of the data and other IT infrastructures to prevent the confidential data from the vulnerability issues. This book focuses on virtual currency, types of virtual currency, crypto currencies, methods used in virtual currency, obtaining and generating virtual currency, sending and exchanging of virtual currency, pros and cons of virtual currencies. It also deals with the concept of Blockchain technology, Blockchain architecture, and components of Blockchain, decentralization, applications and characteristics of Blockchain technology, cyber attacks in Blockchain. This material also provides the knowledge on security auditing, steps to conduct security audit, types of security audit and practices in detail. This material acts as a ready reckoner to explore the various kinds of virtual currency, significance of Blockchain technology and the practice of security audit to ensure the organization’s security.
The book on "Vulnerability Assessment with Nessus" is primarily intended to provide comprehensive view about the process of Vulnerability Assessment, its objectives, importance, and the methodology to be carried out. The key objective of the book is to introduce and review different automated tools available to conduct Vulnerability Assessment process. Nessus is one of the automated security scanning tools. This book demonstrates how to work with Nessus to dis
The book on "Vulnerability Assessment with Nessus" is primarily intended to provide comprehensive view about the process of Vulnerability Assessment, its objectives, importance, and the methodology to be carried out. The key objective of the book is to introduce and review different automated tools available to conduct Vulnerability Assessment process. Nessus is one of the automated security scanning tools. This book demonstrates how to work with Nessus to discover vulnerabilities, misconfigurations, and other security weaknesses in any network infrastructure. Scanning results generated are presented and the reports generated will be useful for the security professionals to recommend appropriate mitigations and to develop and suggest a security model to handle threats.
The book on “Different Types of Network and System Security” deals with various types of network and computer system security. Cyber security is a domain which helps to secure the computer network and devices in an authentic way. The kinds of security areas include network security, operating system security, computer security, web security, email security, mobile device security, cloud security, IoT security, securing cyber physical systems and so
The book on “Different Types of Network and System Security” deals with various types of network and computer system security. Cyber security is a domain which helps to secure the computer network and devices in an authentic way. The kinds of security areas include network security, operating system security, computer security, web security, email security, mobile device security, cloud security, IoT security, securing cyber physical systems and social media security. Today, security can be enhanced at various levels of the network operating system. This book focuses on different types of network and system security and also the attacks that take place at each levels of a system. The cyber attacks are targeting the security aspects of a system by compromising the features and intrude into the network to expose the system control. Different types of security and the associated attacks with the security frameworks are dealt briefly. This material acts as a ready reckoner to explore the various kinds of network and system security attacks and the methods to handle them.
The book on “User Authentication Methods and Security Models” is a simple course on user authentication methods. Authentication is one of the primary principles of security. Biometric authentication is a type of user authentication that relies on the biological characteristics of the individuals. The biological characteristics are unique and are efficient in verifying a person’s identity effectively. Biometric systems are automated met
The book on “User Authentication Methods and Security Models” is a simple course on user authentication methods. Authentication is one of the primary principles of security. Biometric authentication is a type of user authentication that relies on the biological characteristics of the individuals. The biological characteristics are unique and are efficient in verifying a person’s identity effectively. Biometric systems are automated methods for verifying the identity of an individual. Government organizations and non government organizations use biometric systems to verify the individuals. They are accurate and unique. However, they are also subject to attacks and compromise. This book focuses on biometric systems, their categories and the possible security threats. Security models prescribe the methods to implement security in an organization. They help the organizations to develop security policies. Different security models and security mechanisms are dealt briefly and it acts as a ready reference for the organizations to explore and implement.
The book on “Cyber Security” aims to cover interesting topics that can serve as textbook for Undergraduate level courses in Technology/ Engineering and Post Graduate level courses in Management, Arts and Social Sciences and Sciences. Every chapter is supported with a glossary, acronyms, objective type of questions, activities along with short and long answer questions. Adequate number of tables and figures are added to understand the topics thoroug
The book on “Cyber Security” aims to cover interesting topics that can serve as textbook for Undergraduate level courses in Technology/ Engineering and Post Graduate level courses in Management, Arts and Social Sciences and Sciences. Every chapter is supported with a glossary, acronyms, objective type of questions, activities along with short and long answer questions. Adequate number of tables and figures are added to understand the topics thoroughly. It is a self-guided material prepared for UGC-SWAYAM MOOC on “Cyber Security”, a non-technology PG Course suitable for core level course or elective level course.
The major objective here is to create awareness among the learners through an introductory level course on cybersecurity through discussions on the basics, different models, cyber-attacks, legal and ethical aspects for building cyber ecosystems. On completion of reading the entire book, the learners will be able to recognize the fundamental concepts in cybersecurity, distinguish among attacks, threats, and vulnerabilities, Intrusion detection and prevention systems.
Are you sure you want to close this?
You might lose all unsaved changes.
The items in your Cart will be deleted, click ok to proceed.