Cyber Security for SPPU 19 Course (TE - VI - AI&DS - 317530) (Decode)

Cyber Security for SPPU 19 Course (TE - VI - AI&DS - 317530) (Decode) (Paperback, VILAS S. BAGAD, IRESH A. DHOTRE)

Share

Cyber Security for SPPU 19 Course (TE - VI - AI&DS - 317530) (Decode)  (Paperback, VILAS S. BAGAD, IRESH A. DHOTRE)

Be the first to Review this product
₹130
i
Available offers
  • Bank Offer5% Unlimited Cashback on Flipkart Axis Bank Credit Card
    T&C
  • Delivery
    Check
    Enter pincode
      Delivery by16 Jun, Monday|55
      ?
    View Details
    Highlights
    • Binding: Paperback
    • Publisher: TECHNICAL PUBLICATIONS, PUNE
    • ISBN: 9789355853646, 9355853646
    • Edition: FIRST, 2023
    • Pages: 144
    Services
    • Cash on Delivery available
      ?
    Seller
    TechnicalPublications
    3.4
    • 7 Days Replacement Policy
      ?
  • See other sellers
  • Description
    Syllabus Cyber Security - (317530) Credit Examination Scheme : 03 End_Semester(TH) : 70 Marks Unit III Public Key And Management Public Key Cryptography, RSA Algorithm : Working, Key length, Security, Key Distribution, Deffie-Hellman Key Exchange, Elliptic Curve : Arithmetic, Cryptography, Security, Authentication methods, Message Digest, Kerberos, X.509 Authentication service. Digital Signatures : Implementation, Algorithms, Standards (DSS), Authentication Protocol. (Chapter - 3) Unit IV Security Requirements IP Security : Introduction, Architecture, IPV6, IPv4, IPSec protocols, and Operations, AH Protocol, ESP Protocol, ISAKMP Protocol, VPN. WEB Security : Introduction, Secure Socket Layer (SSL), SSL Session and Connection, SSL Record Protocol, Change Cipher Spec Protocol, Alert Protocol, Handshake Protocol. Electronic Mail Security : Introduction, Pretty Good Privacy, MIME, S/MIME, Comparison. Secure Electronic Transaction (SET). (Chapter - 4) Unit V Firewall And Intrusion Introduction, Computer Intrusions. Firewall Introduction, Characteristics and types, Benefits and limitations. Firewall architecture, Trusted Systems, Access Control. Intrusion detection, IDS : Need, Methods, Types of IDS, Password Management, Limitations and Challenges. (Chapter - 5) Unit VI Cyber Forensic, Hacking & its countermeasures Personally Identifiable Information (PII), Cyber Stalking, Cybercrime, PII Confidentiality Safeguards, Information Protection Law : Indian Perspective. Hacking : Remote connectivity and VoIP hacking, Wireless Hacking, Mobile Hacking, countermeasures. (Chapter - 6)
    Read More
    Specifications
    Book Details
    Publication Year
    • 2023
    Book Type
    • DECODE
    Number of Pages
    • 144
    University Books Details
    Degree/Diploma
    • DEGREE
    Additional Features
    Age Group
    • 18 TO 60 YEARS
    Be the first to ask about this product
    Safe and Secure Payments.Easy returns.100% Authentic products.
    You might be interested in
    Popular Psychology Books
    Min. 50% Off
    Shop Now
    Language And Linguistic Books
    Min. 50% Off
    Shop Now
    Politics Books
    Min. 50% Off
    Shop Now
    Other Self-Help Books
    Min. 50% Off
    Shop Now
    Back to top