Rajesh Kumar Goutam - Cybersecurity Fundamentals
Here you can read online Rajesh Kumar Goutam - Cybersecurity Fundamentals full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: BPB Publications, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:
Romance novel
Science fiction
Adventure
Detective
Science
History
Home and family
Prose
Art
Politics
Computer
Non-fiction
Religion
Business
Children
Humor
Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.
- Book:Cybersecurity Fundamentals
- Author:
- Publisher:BPB Publications
- Genre:
- Year:2021
- Rating:3 / 5
- Favourites:Add to favourites
- Your mark:
- 60
- 1
- 2
- 3
- 4
- 5
Cybersecurity Fundamentals: summary, description and annotation
We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cybersecurity Fundamentals" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.
Cybersecurity Fundamentals — read online for free the complete book (whole text) full work
Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cybersecurity Fundamentals" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.
Font size:
Interval:
Bookmark:
Fundamentals
Its Importance and Modern Techniques
Used by Cybersecurity Professionals
www.bpbonline.com
FIRST EDITION 2021
Copyright BPB Publications, India
ISBN: 978-93-90684-731
All Rights Reserved. No part of this publication may be reproduced, distributed or transmitted in any form or by any means or stored in a database or retrieval system, without the prior written permission of the publisher with the exception to the program listings which may be entered, stored and executed in a computer system, but they can not be reproduced by the means of publication, photocopy, recording, or by any electronic and mechanical means.
LIMITS OF LIABILITY AND DISCLAIMER OF WARRANTY
The information contained in this book is true to correct and the best of authors and publishers knowledge. The author has made every effort to ensure the accuracy of these publications, but publisher cannot be held responsible for any loss or damage arising from any information in this book.
All trademarks referred to in the book are acknowledged as properties of their respective owners but BPB Publications cannot guarantee the accuracy of this information.
Distributors:
BPB PUBLICATIONS
20, Ansari Road, Darya Ganj
New Delhi-110002
Ph: 23254990/23254991
MICRO MEDIA
Shop No. 5, Mahendra Chambers,
150 DN Rd. Next to Capital Cinema,
V.T. (C.S.T.) Station, MUMBAI-400 001
Ph: 22078296/22078297
DECCAN AGENCIES
4-3-329, Bank Street,
Hyderabad-500195
Ph: 24756967/24756400
BPB BOOK CENTRE
376 Old Lajpat Rai Market,
Delhi-110006
Ph: 23861747
Published by Manish Jain for BPB Publications, 20 Ansari Road, Darya Ganj, New Delhi-110002 and Printed by him at Repro India Ltd, Mumbai
www.bpbonline.com
Professor Brijendra Singh
Who encouraged me to write this book
Dr. Rajesh Kumar Goutam is an assistant professor in Department of Computer Science University of Lucknow. He has over 10 years of experience in teaching and research in the computer science field. He did his MCA from Uttar Pradesh Technical University, Lucknow, and earned his Ph.D. in Computer Science from Babasaheb Bhimrao Ambedkar University, Lucknow.
Goutams interest lies in developing the framework to detect the true source of cybercrime and to track the criminals across digital infrastructure. He has contributed to the Cybersecurity field through his several publications in various journals of repute. The author is an active member of various professional bodies too.
Vignesh Balasubramanian has over vast of experience in performing Vulnerability Assessments, Penetration Testing and Digital Forensics Investigations. Prior to becoming a cybersecurity professional, he worked as a Systems Integration Tester at Reliance Jio Infocomm Limited in Mumbai. He is now working independently on cybersecurity training and consulting projects.
First and foremost, I am thankful to Almighty God and my parents too for their blessings and enabling me to complete this book.
I would like to thank Professor Alok Kumar Rai, Vice-Chancellor of the University of Lucknow, who believed in my capabilities and provided me congenial atmosphere and necessary infrastructure to write this book.
I am thankful to Prof. Brijendra Singh, Head, Department of Computer Science, University of Lucknow, for his continuous encouragement, regular guidance and motivations during the entire period of writing this book. I am indebted to Professor Sanjay Kumar Dwivedi, Head of Computer Science Department, Babasaheb Bhimrao Ambedkar University, Lucknow, who taught me the basics of research. I am also thankful to Dr Suresh Prasad Kannojia for his valuable suggestions on technical aspects of this book. We are fortunate to have Dr Sudhir Singh and his wife Mrs Ranjana who always encouraged me to do outstanding work in research and maintained healthy and convivial environment around me. I am grateful to the entire BPB publication team for providing me the opportunity to complete this book. I owe very special thanks to Dr Vignesh Balasibramanian for technically reviewing this book and to enhance the quality of chapters.
Finally, words fall short to convey my emotional sentiments from the deepest core of my heart to my wife Anupam Lata, brother Mr Rakesh Kumar, bhabhi Mrs Janki, and sisters for constantly supporting me and always being on my side whenever I needed their help.
Today, we have a virtual, parallel and essential world, commonly known as cyberspace, which enables us to perform our personal, social and economical activities online in an efficient manner and facilitates to store sensitive data over global network. Although the internet is considered powerful and indispensible tool for digital revolution, it is vulnerable and provides immense opportunities to criminals to earn illegal money and to get social and political benefits. Criminals launch attacks with their malicious codes to harass individuals, to breach confidential business data, to remotely control digital infrastructure, and to restrict legitimate access to devices. These attacks are rapidly growing in numbers across the world, are triggered by professionals in an organized manner to increase destruction coverage and for greater economical and societal damages. Cybercriminals are now presenting formidable risks for nations to protect their national critical infrastructures and pressurize the governments for their frail demands by paralyzing the functioning of their institutions and crucial sectors.
We are now living in digital age where the internet has a key role in our survival. The internet users, including school children, teenagers, adults and veterans are sharing cyberspace with criminals and publishing the crucial information over internet and are inviting risks. To avoid these risks, the internet users must understand its perils together with its benefits. It is time to be a smart user so that we can reap the benefits of information and communication technologies and can fail criminals malicious attempts without any inconvenience to our safe access to cyberspace and internet enabled devices. This book has been envisaged to meet these requirements and is delivered to spread awareness about the inherent risks with internet technologies among its readers.
Cybersecurity is not a state, instead it is a long-term process that protects our digital infrastructure with its inherent software, hardware, networks and database with appropriate procedural and technological counter measures. Unfortunately, we are still dependent on firewalls and third-party antivirus software for the protection of digital infrastructure, which is grotesque. To tackle with cybercriminals tactics to gain access to digital infrastructure and to make them failure in their malicious attempts, we need to devise our own defense strategies such as Intrusion Detection System, Prevention systems, and Response Systems that requires the fundamental knowledge of the Cybersecurity subject. This book has been written with these considerations and provides comprehensive knowledge of important topics ranging from basics of computer security to flooding attacks and Cyberwar. This book is useful for BTech/MTech, BSc/MSc, BCA/MCA students in Computer Science and Information Technology both disciplines. This book can be useful resource for researchers who are interested to pursue a career in Cybersecurity area of research.
Font size:
Interval:
Bookmark:
Similar books «Cybersecurity Fundamentals»
Look at similar books to Cybersecurity Fundamentals. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.
Discussion, reviews of the book Cybersecurity Fundamentals and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.