This book provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics.
Table of Contents.
Detailed Table of Contents.
1: Cyber–Crime: Policies and Implications.
2: The UID Project: Lessons Learned from the West and Challenges Identified for India.
3: Combined Impact of Outsourcing and Hard Times on BPO Risk and Security.
4: A Comparison of Cyber–Crime Definitions in India and the United States.
5: Emergency Response to Mumbai Terror Attacks: An Activity Theory Analysis.
6: Pirates of the Copyright and Cyberspace: Issues Involved.
7: Cyber–Security: Technology Review.
8: Classifying Host Anomalies: Using Ontology in Information Security Monitoring.
9: Securing Next Generation Internet Services.
10: An Examination of Identity Management Models in an Internet Setting.
11: Securing Cloud Environment.
12: DoS Attacks in MANETs: Detection and Countermeasures.
13: Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks.
14: Extended Time Machine Design Using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic.
15: Metamorphic Malware Analysis and Detection Methods.
16: Cyber–Security: Methods and Algorithms.
17: Towards Checking Tampering of Software.
18: Complexity Measures of Cryptographically Secure Boolean Functions.
19: Einstein–Podolsky–Rosen Paradox and Certain Aspects of Quantum Cryptology with Some Applications.
20: Error Linear Complexity Measures of Binary Multisequences.
21: A Survey on Digital Image Steganographic Methods.