001442617 000__ 04577cam\a2200601\i\4500 001442617 001__ 1442617 001442617 003__ OCoLC 001442617 005__ 20230310003427.0 001442617 006__ m\\\\\o\\d\\\\\\\\ 001442617 007__ cr\un\nnnunnun 001442617 008__ 211103s2022\\\\si\a\\\\ob\\\\000\0\eng\d 001442617 019__ $$a1282602240$$a1283141908$$a1283857283$$a1287768702$$a1296666790 001442617 020__ $$a9789811665974$$q(electronic bk.) 001442617 020__ $$a9811665974$$q(electronic bk.) 001442617 020__ $$z9789811665967 001442617 020__ $$z9811665966 001442617 0247_ $$a10.1007/978-981-16-6597-4$$2doi 001442617 035__ $$aSP(OCoLC)1282008764 001442617 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP$$dN$T$$dDCT$$dOCLCF$$dOCLCO$$dDKU$$dOCLCQ$$dOCLCO$$dOCLCQ 001442617 049__ $$aISEA 001442617 050_4 $$aQA76.9.A25$$bD87 2022 001442617 08204 $$a005.8$$223 001442617 1001_ $$aDutta, Nitul,$$eauthor. 001442617 24510 $$aCyber security :$$bissues and current trends /$$cNitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop. 001442617 264_1 $$aSingapore :$$bSpringer,$$c[2022] 001442617 264_4 $$c©2022 001442617 300__ $$a1 online resource :$$billustrations (chiefly color) 001442617 336__ $$atext$$btxt$$2rdacontent 001442617 337__ $$acomputer$$bc$$2rdamedia 001442617 338__ $$aonline resource$$bcr$$2rdacarrier 001442617 347__ $$atext file 001442617 347__ $$bPDF 001442617 4901_ $$aStudies in computational intelligence,$$x1860-9503 ;$$vvolume 995 001442617 504__ $$aIncludes bibliographical references. 001442617 5050_ $$aChapter 1. Introduction to Cybersecurity -- Chapter 2. Being Hidden and Anonymous -- Chapter 3. TOR-The Onion Router -- Chapter 4. DarkNet and Hidden Services -- Chapter 5. Introduction to Digital Forensics -- Chapter 6. Intrusion Detection Systems fundamentals -- Chapter 7. Introduction to Malware Analysis -- Chapter 8. Design of a Virtual Cybersecurity Lab -- Chapter 9. Importance of Cyber Law. 001442617 506__ $$aAccess limited to authorized users. 001442617 520__ $$aThis book presents various areas related to cybersecurity. Different techniques and tools used by cyberattackers to exploit a system are thoroughly discussed and analyzed in their respective chapters. The content of the book provides an intuition of various issues and challenges of cybersecurity that can help readers to understand and have awareness about it. It starts with a very basic introduction of security, its varied domains, and its implications in any working organization; moreover, it will talk about the risk factor of various attacks and threats. The concept of privacy and anonymity has been taken into consideration in consecutive chapters. Various topics including, The Onion Router (TOR) and other anonymous services, are precisely discussed with a practical approach. Further, chapters to learn the importance of preventive measures such as intrusion detection system (IDS) are also covered. Due to the existence of severe cyberattacks, digital forensics is a must for investigating the crime and to take precautionary measures for the future occurrence of such attacks. A detailed description of cyberinvestigation is covered in a chapter to get readers acquainted with the need and demands. This chapter deals with evidence collection from the victim's device and the system that has importance in the context of an investigation. Content covered in all chapters is foremost and reported in the current trends in several journals and cybertalks. The proposed book is helpful for any reader who is using a computer or any such electronic gadget in their daily routine. The content of the book is prepared to work as a resource to any undergraduate and graduate-level student to get aware about the concept of cybersecurity, various cyberattacks, and threats in the security. In addition to that, it aimed at assisting researchers and developers to build a strong foundation for security provisioning in any newer technology which they are developing. 001442617 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 8, 2021). 001442617 650_0 $$aComputer security. 001442617 650_6 $$aSécurité informatique. 001442617 655_0 $$aElectronic books. 001442617 7001_ $$aJadav, Nilesh,$$eauthor. 001442617 7001_ $$aTanwar, Sudeep,$$eauthor. 001442617 7001_ $$aSarma, Hiren Kumar Deva,$$eauthor. 001442617 7001_ $$aPricop, Emil,$$eauthor. 001442617 77608 $$iPrint version:$$z9811665966$$z9789811665967$$w(OCoLC)1265457866 001442617 830_0 $$aStudies in computational intelligence ;$$vv. 995.$$x1860-9503 001442617 852__ $$bebk 001442617 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-16-6597-4$$zOnline Access$$91397441.1 001442617 909CO $$ooai:library.usi.edu:1442617$$pGLOBAL_SET 001442617 980__ $$aBIB 001442617 980__ $$aEBOOK 001442617 982__ $$aEbook 001442617 983__ $$aOnline 001442617 994__ $$a92$$bISE