ISBN 9788183331746,Information Security

Information Security


Rajat Khare


BPB Publications



BPB Publications

Publication Year 2010

ISBN 9788183331746

ISBN-10 8183331742


Number of Pages 218 Pages
Language (English)

Engineering: general

Information Security is a highly integral aspect of our daily life;so to say our virtual as well as real lives.Information Security is essentially a process for securing the information of any information user.Today we have valuable information which is stored on computer/server or data warehouse and digital storage similar to our erstwhile safes and lockers.The passwords to these digital mediums are the keys as with our physical mediums are the keys as with our physical data and asser security mediums.And today we have hackers who either crack these passwords or bomb the locks with various attacks.In the past all the people had safes for storing their valuables and in todays world almost every one uses computers and stores valuable information like word documents,proposals,usernames,passwords,credit cards.And thus in today’s world we all need to understand information Security.   This book serves as a complete reference for information Security including IT Security,Data Security,Network Security,Internet Security,Penetration Testing,Cryptography and laws govering the industry.The book in written in a simplified manner so that even a beginner in security understands and implements information security both at a personal as well as a corporate level.   Table of contents:   Chapter  1        Introduction to information security and Ethical hacking Chapter  2        Security at your desk-For every computer user Chapter  3        Security in your workgroup-your guide to network security Chapter  4        Security in the virtual world-your IP Is logged on Internet Chapter  5        Penetration testing-Evaluate your information systems security Chapter  6        The Art of Crytography-Behind the locked door Chapter  7        Cyber Laws-The legal aspect of cyberspace Chapter  8        Appendix:Hacking laws Chapter  9        Case study Chapter 10        Glossary