This book titled “Security Auditing with NMAP” is primarily intends to provide a comprehensive view about the process of security auditing, importance, need, types, auditing standards and procedures for auditing. The main objective of this book is to analyse various security risks in a network and perform auditing methods that help to protect critical data, identify security loopholes, create new security policies and track the effectiveness of sec
Cyber Crime Administration is one of the skill enhancement courses prescribed for B.A (Honours) in Public Administration. Cyber Crime Administration course particularly focuses on developing skills and proficiencies suitable for a Public Administrator. A Public Administrator needs to learn the legal and policy development in cyber space by acquiring necessary knowledge and skills for prevention and handling of cyber crimes in an organization. Cyber Crime Admin
Cyber Attacks and Cyber Crimes are increasing tremendously due to the growth of technology day by day. On one hand, technology provides a faster development and solution for many industrial demands. On the other hand, the cyber criminals are in search of loopholes in the systems with information and communication technologies to steal the authentic information without the knowledge of the user. Cyber crimes are committed with the help of technology and cyber c
The book on “Digital Forensics and Investigation Methods” deals with the analysis of digital forensics and the associated investigation methods. We are all living in digital era. On one hand, technology simplifies the daily chores and improves the quality of life of human. On the other hand, cyber crimes are on the raise. Criminals operate more safely and smartly in the digital era. They have changed their landscape of operations. Finding the evide
The book on “Cyber Crimes and Investigation Methods” deals with the cyber crimes, cyber frauds and analysis of cybercrime based on human behavior. In this digital era, technology upliftments are expanded worldwide and also it paves way for cyber crimes. Detecting cyber crimes, attacks and cyber related frauds are need of the hour to safeguard the individual’s personal and financial credentials and also the organization’s privacy policie
The book on “Virtual Currency – Blockchain Technology – Security Auditing” deals with the importance of virtual currency, Blockchain technology and security auditing concepts. Today, virtual currency plays a vital role in share market and foreign exchange. Blockchain technology is a major revolution to store transactional records in a network with enhanced security features. Security auditing is one of the necessary practices of an orga
The book on "Vulnerability Assessment with Nessus" is primarily intended to provide comprehensive view about the process of Vulnerability Assessment, its objectives, importance, and the methodology to be carried out. The key objective of the book is to introduce and review different automated tools available to conduct Vulnerability Assessment process. Nessus is one of the automated security scanning tools. This book demonstrates how to work with Nessus to dis
The book on “Different Types of Network and System Security” deals with various types of network and computer system security. Cyber security is a domain which helps to secure the computer network and devices in an authentic way. The kinds of security areas include network security, operating system security, computer security, web security, email security, mobile device security, cloud security, IoT security, securing cyber physical systems and so
The book on “User Authentication Methods and Security Models” is a simple course on user authentication methods. Authentication is one of the primary principles of security. Biometric authentication is a type of user authentication that relies on the biological characteristics of the individuals. The biological characteristics are unique and are efficient in verifying a person’s identity effectively. Biometric systems are automated met
The book on “Cyber Security” aims to cover interesting topics that can serve as textbook for Undergraduate level courses in Technology/ Engineering and Post Graduate level courses in Management, Arts and Social Sciences and Sciences. Every chapter is supported with a glossary, acronyms, objective type of questions, activities along with short and long answer questions. Adequate number of tables and figures are added to understand the topics thoroug