spacer
Saujanya books, indian books, books from india, tibetan books, tibetan texts, tibetan pecha, tibetan pechas, book store, bookstore, book shop, bookshop, book india, buy books online, online book store, online bookstore, buy books, books online, india book store, book from india, book shop india, bookshop in India, book seller in India, indian book store, online bookshop, wholesale book sellers, discount books store, indian authors books, online book store india, discount book seller, all subjects books, books from india, book publisher in india, online discount books, indian book seller, india books, book shopping, book distributor in India, wholesale book distributor
leftBar
rightBar
leftBar
rightBar
leftBar
rightBar
leftBar
rightBar
leftBar
rightBar
leftBar
rightBar
leftBar
rightBar

Welcome to www.saujanyabooks.com

spacer
 view Items
Total Title : 0
spacer
Sign In | Recommend Site
spacer
spacer
spacer
boxsearch
spacer
   
spacer
   
spacer
  Advanced Search
spacer
spacer
spacer
spacer
 
cards
spacer
 
 
 Book Details
arrow
spacer
spacer
Cyber Crimes: Notorious Aspects of the Humans and the Net; 4 Volumes / Barua, Yogesh & Dayal, Denzyl P.
spacer
 
Cyber Crimes: Notorious Aspects of the Humans and the Net; 4 Volumes
Barua, Yogesh & Dayal, Denzyl P.
 
  add
List Price : US$ 214.48
Our Price : US$ 171.58

You Save 20% + FREE DELIVERY WORLDWIDE
  Set
 
  recommend
spacer
 PRODUCT DETAILS
spacer
spacer
  Book ID : 13575
  ISBN-10 : 81-7888-032-6 / 8178880326
  ISBN-13 : 978-81-7888-032-7 / 9788178880327
  Place of Publication : Delhi
  Year of Publication : 2001
  Edition :
  Language : English
  v+376p., v+362p., v+336p., v+426p., 25 cm.
   
spacer
 CONTENTS
spacer
CONTENTS:-
Vol.1: Criminal activities in cyber world: 1. Emergence of cyber crime: latest scenario of crime & law. 2. Increasing focus: increasing threats: internet & networks abuse. 3. Hiding crimes in cyberspace: encryption-a double edged knife. 4. Rising challenges: need for continuous regulatory updates. 5. Cyber gambling: uncontrollable and proliferating. 6. Responding to new economy & controls: new technology used to commit old crimes. 7. Facing challenges in law enforcement: limitation & capabilities of tools. 8. Locating, identifying, stopping the criminals: http://www.Tom where are U? 9. India awakens: developing teeth to stop crimes & abuse. 10. Hackers & the hacking: the first & foremost of the cyber crimes. 11. Hackers: the people, the believers: sneaking into their world & community.

Vol.2: Span attacks, cyber stalking and abuse: 1. Spam attacks and spammers: the potential irritants & time-wasters. 2. Identify culprits and stop them: the spamking cometh. 3. The insider threat to information systems: the psychology of the dangerous insider. 4. Cyber stalking and harassment: fighting the virtual hell & real life nightmares. 5. Rules of the road for the information superhighway.

Vol.3: Cyber terrorism, hoaxes, & law enforcement: 1. Cyber terrorism: the internet opens new arena for outlaws. 2. Countering the cyber terrorism: gathering intelligence, tools & techniques. 3. Cyber hoaxes: not so funny, incur heavy losses sometimes. 4. Child pornography on the internet: the book "Lolita" and its horrible aftermath. 5. Rise & development of porn industry: the secret history of civilisation. 6. Computer viruses on the internet: their history, evolution and reality. 7. Searching & seizing computers under law: the US pocedure could well suit us too. 8. Electronic surveillance of networks: rising question of privacy infringement. 9. The crime combat: FBI develops sniffer: the carnivore project under controversy. 10. Random reports of net crimes: writing on the wall.

Vol.4: Frauds & financial crimes in cyberspace: 1. Criminals hot on cyberspace money trail: catch them if you can. 2. Cyberlaundering: anonymous digital cash and money laundering. 3. Long distance scams & frauds. 4. Investment scams and stock frauds: demographics, expectations & the frauds. 5. Business opportunities: fraudulent business opportunity scams. 6. Terms & techniques: techniques used to sell fraudulent investments. 7. Pyramid schemes: the most notorious, hence most successful. 8. Fraudulent chain letter scams. 9. The weight loss industry. 10. More instances & examples of internet fraud. 11. Women empowering women: another pyramid of deception. 12. Talent scout & travel scams. 13. Money problem scams. 14. Major thefts of online credit card info. 15. Bank and banking related fraud. 16. Placement techniques of money laundering. 17. Avoiding internet investment scams.
spacer
spacer
 DESCRIPTION
spacer
As a saying in criminology goes-a crime will happen when and only when the opportunity avails itself. The internet has opened up a whole new virtual heaven for the people both good & bad, clever and naïve to interact with lot of diverse cultures and sub-cultures, geography & demographics being no bar. The very same virtues of internet when gone in wrong hands or when exploited by people with dirty minds & malicious intentions make it a virtual hell. Stories of copyright theft, hacking & cracking virus attacks & plain hoaxes-started sweeping in with the growth of the medium. The book covers in all its four volumes, the complete scenario of the internet crimes, their magnitude and nature and studies the people who are responsible for it. The book also takes a comprehensive view of the governmental efforts being done in India & abroad to stop such crimes and looks closely on their success & failures.
spacer
   
spacer
 
 
 

 

 

 
 
COPYRIGHT © 2001-2022, SAUJANYA BOOKS HOW TO ORDER I PAYMENTS I SITE MAP I FEEDBACK I LINKS I CONTACT US
Sitemap RSS Feed Sitemap    SAUJANYA BOOKS : 165-E, Kamla Nagar, Delhi - 110007 (INDIA)