spacer
Saujanya books, indian books, books from india, tibetan books, tibetan texts, tibetan pecha, tibetan pechas, book store, bookstore, book shop, bookshop, book india, buy books online, online book store, online bookstore, buy books, books online, india book store, book from india, book shop india, bookshop in India, book seller in India, indian book store, online bookshop, wholesale book sellers, discount books store, indian authors books, online book store india, discount book seller, all subjects books, books from india, book publisher in india, online discount books, indian book seller, india books, book shopping, book distributor in India, wholesale book distributor
leftBar
rightBar
leftBar
rightBar
leftBar
rightBar
leftBar
rightBar
leftBar
rightBar
leftBar
rightBar
leftBar
rightBar

Welcome to www.saujanyabooks.com

spacer
 view Items
Total Title : 0
spacer
Sign In | Recommend Site
spacer
spacer
spacer
boxsearch
spacer
   
spacer
   
spacer
  Advanced Search
spacer
spacer
spacer
spacer
 
cards
spacer
 
 
 Book Details
arrow
spacer
spacer
Cyber Crimes and Law; 2 Volumes / Dudeja, V.D.
spacer
 
Cyber Crimes and Law; 2 Volumes
Dudeja, V.D.
 
  add
List Price : US$ 94.69
Our Price : US$ 75.75

You Save 20% + FREE DELIVERY WORLDWIDE
  Set
 
  recommend
spacer
 PRODUCT DETAILS
spacer
spacer
  Book ID : 13477
  ISBN-10 : 81-7169-708-9 / 8171697089
  ISBN-13 : 978-81-7169-708-3 / 9788171697083
  Place of Publication : Delhi
  Year of Publication : 2002
  Edition : (First Edition)
  Language : English
  vi+279p., ix+243p., Index, 25 cm.
   
spacer
 CONTENTS
spacer
CONTENTS:- Vol.1: 1. International perspectives on computer related crimes. 2. Criminal offences. 3. Internet related crimes. 4. The world wide web and legal resources. 5. Cyber terrorism and its network. 6. Menance of virus. 7. Intellectual property rights and law. 8. Privacy and its legal safeguards. 9. E-contract and law. 10. Evidence and law. 11. Electronic banking and legal support. 12. Bank related crimes. 13. Frauds and scams. 14. Cyber crime-robberies and its prevention. 15. Understanding forged and digital signatures. 16. Hackers, crackers and whackers attack. 17. Threat to information systems and security. 18. Cyber consumers and E-commerce. 19. Net work security. 20. Integrating cyber crime and law. Appendix: 1. Terrorism and the law. 2. The prevention of terrorism ordinance, 2001-at a glance. Bibliography. Index. Vol.2: 1. Conceptual framework. 2. Nature and scope. 3. Issues and concerns. 4. Computer related crimes and law. 5. Internet related scams and frauds. 6. Cyber terrorism and law enforcement. 7. Web sites-valuable legal resource. 8. Intellectual property rights and its legal safeguards. 9. Electronic documents and contract. 10. Electronic signatures. 11. Communication and convergence. 12. E-business. 13. Electronic commerce. 14. Electronic payment and legal implications. 15. Financial crimes and law. 16. The Information Technology Act, 2000-at a glance.
spacer
spacer
 DESCRIPTION
spacer
The word Cyberspace was coined by William Gibson in the science fiction-'Neuromancer' published in 1984. It is used as a means of denoting the apparent or virtual location within which electronic activities take place. The aggregation of Intranets, Internet and the World Wide Web is dubbed as cyberspace. The computer is a computing as well as communication tool. By 2005, 50 percent of Internet access would be through non-PC devices. The Internet has opened up a virtual heaven for the people for both good and bad, native to interact with lot of diverse cultures, and demographics. The very same virtues of Internet when gone in wrong hands or when exploited by people with malicious intentions make up a virtual hell. Copyright, theft, cracking, virus attacks etc. started sweeping with the growth medium and the present scenario, and their nature and magnitude. Cyber crime is the most recent type of crime, which affects many people. This is the biggest challenge for police, prosecutors and lawmakers. If we do not wake up now, we would be mere spectators in cyber world. The criminal provisions deal with offences such as tampering with source code, hacking into computer systems, publishing of obscene information and misuse of licenses and digital signature etc. Government efforts being done in India and abroad to stop such crimes, and looks closely on their success and failure. Cyber laws are those laws, which have been adapted or reinterpreted to govern or apply to transactions or interactions in cyber-space. Cyber laws cover these special enactments, which are specially designed to govern or apply to cyber space for example, the Electronic Commerce Act on the uniform computer, Information Transaction Act and the uniform Electronics Transaction Act recently approved in the US for adoption by the various US states. We need to learn from the experiences in other countries and to examine how our current contract laws could be applied to such contracts. The Information Technology Act 2000, is being implemented in India. Times have changed and we live in a digital age in which crimes transported over the same networks and to use integrated devices to overcome it. Just as overdose of regulation could halt the growth of technology just as the lack of clear and consistent law hinder progress. Thus a fine balance to be achieved between the two with due care and consideration.
spacer
   
spacer
 
 
 

 

 

 
 
COPYRIGHT © 2001-2022, SAUJANYA BOOKS HOW TO ORDER I PAYMENTS I SITE MAP I FEEDBACK I LINKS I CONTACT US
Sitemap RSS Feed Sitemap    SAUJANYA BOOKS : 165-E, Kamla Nagar, Delhi - 110007 (INDIA)