Take a look at our COM060040 books. Shulph carries a great selection of COM060040 books, and we are always adding more.
Cyber crime stories and tricks used by cyber criminals to trap people and preventive tips to avoid cyber crimes. Key Features -Real-case studies and true events on cyber crime incidents. -Learn how to protect yourself from cyber threats and assist police for crime investigation. -Coverage on financial frauds, social media crimes, mobile payment frauds, and a lot more. Description The book ‘Cybercrime and Preventive Measures' provides a strong and precise introduction to the world of cybercrime and the need of cyber awareness for everyone. It begins with email-related popular cyber crimes such as phishing, spamming, spoofing, email bombing, etc. It talks about the methodologies adopted by cyber criminals to trap people along with some real-case studies (names of victims changed) and preventive measures to be taken to safeguard against email-related cyber crime. This book exposes you to a variety of financial frauds committed by cyber criminals and the modus of operandi they adopt while committing cyber crimes along with numerous case studies. The book keeps you informed about what preventive and safety measures can be exercised so that you can protect yourself, your family, and even your workplace. This book also assists young teenagers and school students about the methods adopted by hackers and how to remain safe while using social media applications and Internet shopping sites. This book talks about the risks involved and preventive measures that need to be taken while using mobile apps. What you will learn -Get familiar with the top rated cyber crime incidents in India. -Understand the different types of cyber crimes and the modus of operandi adopted by the cyber criminals. -Learn to identify and manage cybersecurity threats and protect yourself from cyber vulnerabilities. Who this book is for This book is for everyone, students, or professionals, who are frequently using smartphones, computers, laptops, and smart devices over the Internet. This book guides you to protect yourself from cyber threats while browsing the internet, watching videos over the Internet, using emails, and using social media apps such as WhatsApp, Facebook, Twitter, LinkedIn, or playing online games. Table of Contents 1. Email-related Cybercrimes 2. Financial Frauds and Cybercrime 3. Cybercrime in Social Media 4. Mobile Application-related Frauds 5. To Do List for Working Professionals and Small Businesses 6. Complaint Registration Procedure 7. References About the Authors Priyanka Tomar, is the Director of New Era System Pvt Ltd and has 18 years of experience in various IT fields, including Cyber Security and Cyber Forensics. She has been a guest faculty at CBI Academy, Ghaziabad since 2014 and is also an advisor to government and private organisations on cybersecurity-related issues, R&D projects, etc. She is a regular speaker and discussion panelist at cybersecurity events. She imparts customized Cyber Security Training on cyber security and cyber forensics such as darknet forensics, cryptocurrency forensics, cyber Intelligence & OSINT, Network Forensics, Protecting Critical Infrastructure, Website Security, Blockchain-based solutions, IoT & Smart Cities Solutions, etc. Blog Link: Cybersecurityaudits Sanjay Gautam joined CBI in 2002 and has experience in the investigation of anti-corruption cases and cyber crime cases, including crimes against women and children. He has provided technical assistance in various hi-profile cases. He has attended a number of INTERPOL's Train-the-Trainer workshops in India, Cyprus, and South Korea and was ranked 1st among various INTERPOL countries. He is a regular guest faculty for various Central Training Institutes. He was also invited by UNDP and INTERPOL to deliver a lecture at Kuala Lumpur, Malaysia. He has also attended INTERPOL’s Digital Forensics Experts Meeting in South Korea. He has been imparting training to a large number of police officers from CBI, State Police Forces, Judiciary, Security Agencies, CPOs, etc. from India, SAARC. LinkedIn Bio: Sanjay Gautam
Cybersecurity for Beginners Key Features -In-depth coverage of cybersecurity concepts, vulnerabilities and detection mechanism. -Cutting-edge coverage on frameworks, Intrusion detection methodologies and how to design cybersecurity infrastructure. -Access to new tools, methodologies, frameworks and countermeasures developed for cybersecurity. Description Cybersecurity Fundamentals starts from the basics of data and information, includes detailed concepts of Information Security and Network Security, and shows the development of ‘Cybersecurity’ as an international problem. This book talks about how people started to explore the capabilities of Internet technologies to conduct crimes globally. It covers the framework for analyzing cyber costs that enables us to have an idea about the financial damages. It also covers various forms of cybercrime which people face in their day-to-day lives and feel cheated either financially or blackmailed emotionally. The book also demonstrates Intrusion Detection Systems and its various types and characteristics for the quick detection of intrusions in our digital infrastructure. This book elaborates on various traceback schemes and their classification as per the utility. Criminals use stepping stones to mislead tracebacking and to evade their detection. This book covers stepping-stones detection algorithms with active and passive monitoring. It also covers various shortfalls in the Internet structure and the possible DDoS flooding attacks that take place nowadays. What you will learn -Get to know Cybersecurity in Depth along with Information Security and Network Security. -Build Intrusion Detection Systems from scratch for your enterprise protection. -Explore Stepping Stone Detection Algorithms and put into real implementation. -Learn to identify and monitor Flooding-based DDoS Attacks. Who this book is for This book is useful for students pursuing B.Tech.(CS)/M.Tech.(CS),B.Tech.(IT)/M.Tech.(IT), B.Sc (CS)/M.Sc (CS), B.Sc (IT)/M.Sc (IT), and B.C.A/M.C.A. The content of this book is important for novices who are interested to pursue their careers in cybersecurity. Anyone who is curious about Internet security and cybercrime can read this book too to enhance their knowledge. Table of Contents 1. Introduction to Cybersecurity 2. Cybersecurity Landscape and its Challenges 3. Information Security and Intrusion Detection System 4. Cybercrime Source Identification Techniques 5. Stepping-stone Detection and Tracing System 6. Infrastructural Vulnerabilities and DDoS Flooding Attacks About the Authors Dr. Rajesh Kumar Goutam is working as an Assistant professor in the Department of Computer Science, University of Lucknow. He has over 10 years of experience in teaching and research in the field of Computer Science. He did his MCA from Uttar Pradesh Technical University, Lucknow and earned his Ph.D. in Computer Science from Babasaheb Bhimrao Ambedkar University, Lucknow. His interest lies in developing the framework to detect the true source of cybercrimes and to track the criminals across digital infrastructures. He has contributed to the cybersecurity field through his several publications in various journals of repute. He is an active member of various professional bodies too.
Learn to secure your personal data & reclaim your online privacy! Key Features Understand your cyber risk exposure by calculating your Privacy Score™ Improve your Privacy Score with easy-to-follow recommendations Different recommendations for different levels of expertise – YOUR choice! An ‘interactive’ book with inline QR code references for further learning! Instantly applicable recommendations that show immediate results! Gamification of recommended actions to incentivize best practice behaviors Quantifiable* improvement by the end of the book! Description This book intends to be a comprehensive step-by-step guide on how to take control of all your digital footprints on the internet. You will begin with a quick analysis that will calculate your current Privacy Score. The aim of this book is to improve this Privacy Score by the end of the book. By the end of this book, you will have ensured that the information being leaked by your phone, your desktop, your browser, and your internet connection is minimal-to-none. All your online accounts for email, social networks, banking, shopping, etc. will be made secure and (almost) impervious to attackers. You will have complete control over all of your personal information that is available in public view. Your personal information belongs to you and you alone. It should never ever be available for anyone else to see without your knowledge and without your explicit permission. What will you learn -How to safeguard your privacy online -How to secure your personal data & keep it private -How to prevent your devices from leaking your private info -How to prevent various websites & services from ‘spying’ on you -How to ‘lock down’ your social media profiles -How to identify threats to your privacy and what counter-measures to take Who this book is for Anyone who values their digital security and privacy and wishes to ‘lock down’ their personal data will find this book useful. Corporate IT departments can use this as a reference book to design data security practices and training modules for employees. Table of Contents 1. Prologue 2. Internet and Privacy 3. Android Devices 4. Apple iPhones 5. Smartphone Apps 6. Smart Devices & IoT 7. Desktops – Operating Systems 8. Desktops – Software Applications 9. Desktops – Browsers 10. Services - Email 11. Software-as-a-Service (SaaS) 12. Networks: Connectivity, & Internet 13. Operational Security (OPSEC) 14. Epilogue 15. Bonus Chapter: Useful Tips and Tricks About the Author Rohit Srivastwa is a well-known Security Evangelist with extensive experience in Cyber Security, Enterprise Security, Secure Digital Transformation, and Cyber warfare. He founded India's first-ever hackers’ conference and community named “ClubHack”. .” A serial entrepreneur, his most recent startup was acquired by QuickHeal Technology Ltd in 2016. His LinkedIn Profile: https://linkedin.com/in/rohit11