Hardly a month passes without a news\n splash on cyber security—be it a new virus strain, botnets, denial of\n service, or a high-profile break-in. Security was once the preserve of the\n military and, more recently, of banks. Today, awareness of security policy\n and practices has moved to the homes and offices of people at large. We are\n more dependent on the Internet than ever before—for banking, e-trading,\n e-commerce, and more. All of a sudden it seems like identity theft, phishing\n attacks, and spyware are everyone's concerns. Indeed, given the stakes\n involved, it is hardly surprising that many corporations worldwide have\n increased their spending on IT security over the last ten years. \n \n Risk analysis, security policy and management, compliance, etc., all come\n under the purview of security. This book, Cryptography, Network Security, and\n Cyber Laws, is principally about providing and understanding technological\n solutions to security. It is about the underlying vulnerabilities in systems,\n services, and communication protocols. It is about their exploitation and\n methods to defend against them.
Add a review
Login to write a review.
Customer questions & answers