• Complain

Rajesh Kumar Goutam - Cybersecurity Fundamentals

Here you can read online Rajesh Kumar Goutam - Cybersecurity Fundamentals full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: BPB Publications, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Rajesh Kumar Goutam Cybersecurity Fundamentals

Cybersecurity Fundamentals: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cybersecurity Fundamentals" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Rajesh Kumar Goutam: author's other books


Who wrote Cybersecurity Fundamentals? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cybersecurity Fundamentals — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cybersecurity Fundamentals" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Table of Contents
Guide

Cybersecurity Fundamentals Understand the Role of Cybersecurity Its - photo 1

Cybersecurity
Fundamentals

Understand the Role of Cybersecurity Its Importance and Modern Techniques Used - photo 2

Understand the Role of Cybersecurity,
Its Importance and Modern Techniques
Used by Cybersecurity Professionals

Cybersecurity Fundamentals - image 3

Dr. Rajesh Kumar Goutam
Assistant Professor
Department of Computer Science
University of Lucknow
Lucknow
Cybersecurity Fundamentals - image 4

www.bpbonline.com

FIRST EDITION 2021

Copyright BPB Publications, India

ISBN: 978-93-90684-731

All Rights Reserved. No part of this publication may be reproduced, distributed or transmitted in any form or by any means or stored in a database or retrieval system, without the prior written permission of the publisher with the exception to the program listings which may be entered, stored and executed in a computer system, but they can not be reproduced by the means of publication, photocopy, recording, or by any electronic and mechanical means.

LIMITS OF LIABILITY AND DISCLAIMER OF WARRANTY

The information contained in this book is true to correct and the best of authors and publishers knowledge. The author has made every effort to ensure the accuracy of these publications, but publisher cannot be held responsible for any loss or damage arising from any information in this book.

All trademarks referred to in the book are acknowledged as properties of their respective owners but BPB Publications cannot guarantee the accuracy of this information.

Distributors:

BPB PUBLICATIONS

20, Ansari Road, Darya Ganj

New Delhi-110002

Ph: 23254990/23254991

MICRO MEDIA

Shop No. 5, Mahendra Chambers,

150 DN Rd. Next to Capital Cinema,

V.T. (C.S.T.) Station, MUMBAI-400 001

Ph: 22078296/22078297

DECCAN AGENCIES

4-3-329, Bank Street,

Hyderabad-500195

Ph: 24756967/24756400

BPB BOOK CENTRE

376 Old Lajpat Rai Market,

Delhi-110006

Ph: 23861747

Published by Manish Jain for BPB Publications 20 Ansari Road Darya Ganj New - photo 5

Published by Manish Jain for BPB Publications, 20 Ansari Road, Darya Ganj, New Delhi-110002 and Printed by him at Repro India Ltd, Mumbai

www.bpbonline.com

Dedicated to

Professor Brijendra Singh
Who encouraged me to write this book

About the Author

Dr. Rajesh Kumar Goutam is an assistant professor in Department of Computer Science University of Lucknow. He has over 10 years of experience in teaching and research in the computer science field. He did his MCA from Uttar Pradesh Technical University, Lucknow, and earned his Ph.D. in Computer Science from Babasaheb Bhimrao Ambedkar University, Lucknow.

Goutams interest lies in developing the framework to detect the true source of cybercrime and to track the criminals across digital infrastructure. He has contributed to the Cybersecurity field through his several publications in various journals of repute. The author is an active member of various professional bodies too.

About the Reviewer

Vignesh Balasubramanian has over vast of experience in performing Vulnerability Assessments, Penetration Testing and Digital Forensics Investigations. Prior to becoming a cybersecurity professional, he worked as a Systems Integration Tester at Reliance Jio Infocomm Limited in Mumbai. He is now working independently on cybersecurity training and consulting projects.

Acknowledgement

First and foremost, I am thankful to Almighty God and my parents too for their blessings and enabling me to complete this book.

I would like to thank Professor Alok Kumar Rai, Vice-Chancellor of the University of Lucknow, who believed in my capabilities and provided me congenial atmosphere and necessary infrastructure to write this book.

I am thankful to Prof. Brijendra Singh, Head, Department of Computer Science, University of Lucknow, for his continuous encouragement, regular guidance and motivations during the entire period of writing this book. I am indebted to Professor Sanjay Kumar Dwivedi, Head of Computer Science Department, Babasaheb Bhimrao Ambedkar University, Lucknow, who taught me the basics of research. I am also thankful to Dr Suresh Prasad Kannojia for his valuable suggestions on technical aspects of this book. We are fortunate to have Dr Sudhir Singh and his wife Mrs Ranjana who always encouraged me to do outstanding work in research and maintained healthy and convivial environment around me. I am grateful to the entire BPB publication team for providing me the opportunity to complete this book. I owe very special thanks to Dr Vignesh Balasibramanian for technically reviewing this book and to enhance the quality of chapters.

Finally, words fall short to convey my emotional sentiments from the deepest core of my heart to my wife Anupam Lata, brother Mr Rakesh Kumar, bhabhi Mrs Janki, and sisters for constantly supporting me and always being on my side whenever I needed their help.

Preface

Today, we have a virtual, parallel and essential world, commonly known as cyberspace, which enables us to perform our personal, social and economical activities online in an efficient manner and facilitates to store sensitive data over global network. Although the internet is considered powerful and indispensible tool for digital revolution, it is vulnerable and provides immense opportunities to criminals to earn illegal money and to get social and political benefits. Criminals launch attacks with their malicious codes to harass individuals, to breach confidential business data, to remotely control digital infrastructure, and to restrict legitimate access to devices. These attacks are rapidly growing in numbers across the world, are triggered by professionals in an organized manner to increase destruction coverage and for greater economical and societal damages. Cybercriminals are now presenting formidable risks for nations to protect their national critical infrastructures and pressurize the governments for their frail demands by paralyzing the functioning of their institutions and crucial sectors.

We are now living in digital age where the internet has a key role in our survival. The internet users, including school children, teenagers, adults and veterans are sharing cyberspace with criminals and publishing the crucial information over internet and are inviting risks. To avoid these risks, the internet users must understand its perils together with its benefits. It is time to be a smart user so that we can reap the benefits of information and communication technologies and can fail criminals malicious attempts without any inconvenience to our safe access to cyberspace and internet enabled devices. This book has been envisaged to meet these requirements and is delivered to spread awareness about the inherent risks with internet technologies among its readers.

Cybersecurity is not a state, instead it is a long-term process that protects our digital infrastructure with its inherent software, hardware, networks and database with appropriate procedural and technological counter measures. Unfortunately, we are still dependent on firewalls and third-party antivirus software for the protection of digital infrastructure, which is grotesque. To tackle with cybercriminals tactics to gain access to digital infrastructure and to make them failure in their malicious attempts, we need to devise our own defense strategies such as Intrusion Detection System, Prevention systems, and Response Systems that requires the fundamental knowledge of the Cybersecurity subject. This book has been written with these considerations and provides comprehensive knowledge of important topics ranging from basics of computer security to flooding attacks and Cyberwar. This book is useful for BTech/MTech, BSc/MSc, BCA/MCA students in Computer Science and Information Technology both disciplines. This book can be useful resource for researchers who are interested to pursue a career in Cybersecurity area of research.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cybersecurity Fundamentals»

Look at similar books to Cybersecurity Fundamentals. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cybersecurity Fundamentals»

Discussion, reviews of the book Cybersecurity Fundamentals and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.