Group Captain Ashok Katariya

ผลงานที่ได้รับความนิยมสูงสุด
  273     1,804

-  File 1
ชื่อเรื่อง :  Fundamentals of Information Security
คำอธิบาย :  1.1 LEARNING OBJECTIVES; 1.2 HISTORY OF INTERNET; 1.3 HOW INTERNET WORKS; 1.4 ADDRESSING SCHEME IN THE INTERNET; 1.5 INTERNET SERVICE PROVIDER; 1.6 DOMAIN NAME SYSTEM(DNS); 1.7 WORLD WIDE WEB(WWW); 1.8 APPLICATION OF INTERNET; 1.9 SUMMARY; 1.10 CHECK YOUR PROGRESS; 1.11 ANSWERS TO CHECK YOUR PROGRESS; 1.12 MODEL QUESTIONS; 2.1 LEARNING OBJECTIVES; 2.2 E-GOVERNANCE; 2.3AIM OF E-GOVERNANCE; 2.4 STAGES OF E-GOVERNANCE; 2.5 MODELS OF E-GOVERNANCE; 2.6 LEGAL AND POLICY FRAMEWORK FOR FACILITATING ICT IN E-GOVERNANCE; 2.7 SIGNIFICANCE OF E-GOVERNANCE; 2.8 CHALLENGES IN THE IMPLEMENTATION OF E-GOVERENCE; 2.9 EVOLUTION IN E-GOVERNANCE AND MATURITY MODELS; 2.10 DIGITAL INDIA PROGRAM; 2.10.1 Services; 2.11 TOWARDS GOOD GOVERNANCE THROUGH E-GOVERNANCE MODELS; 2.12 SUMMARY; 2.13 CHECK YOUR PROGRESS; 2.14 ANSWERS TO CHECK YOUR PROGRESS; 2.15 MODEL QUESTIONS; 3.1LEARNING OBJECTIVES; 3.2 STAGES IN E-GOVERNANCE; 3.3 E-READINESS; 3.4 BENEFITS OF E-GOVERNANCE; 3.5 SUMMARY; 3.6 MODEL QUESTIONS; 4.1 LEARNING OBJECTIVES; 4.2 INTRODUCTION; 4.3 E-COMMERCE; 4.4 E-COMMERCE BUSINESS MODELS; 4.5 INFRASTRUCTURE; 4.6 PAYMENT SYSTEMS; 4.7 SUMMARY; 4.8 CHECK YOUR PROGRESS; 4.9 ANSWERS TO CHECK YOUR PROGRESS; 4.10 MODEL QUESTIONS; BLOCK II: 1.1 LEARNING OBJECTIVES; 1.2 INTRODUCTION; 1.3 MALWARE AND ITS TYPES; 1.4 SUMMARY; 1.5 CHECK YOUR PROGRESS; 1.6 ANSWERS TO CHECK YOUR PROGRESS; 1.7 MODEL QUESTIONS; 2.1 LEARNING OBJECTIVES; 2.2 KINDS OF CYBER CRIME; 2.3 SUMMARY; 2.4 CHECK YOUR PROGRESS; 2.5 ANSWERS TO CHECK YOUR PROGRESS; 2.6 MODEL QUESTIONS; 3.1 LEARNING OBJECTIVES; 3.2 ORGANIZED CRIME; 3.3 IT ACT 2002; 3.4 SUMMARY; 3.5 CHECK YOUR PROGRESS; 3.6 ANSWERS TO CHECK YOUR PROGRESS; 3.7 MODEL QUESTIONS; 4.1 LEARNING OBJECTIVES; 4.2 INTRODUCTION; 4.3 CYBER CRIME - CASE STUDIES; 4.4 LET US SUM UP; 4.5 CHECK YOUR PROGRESS; 4.6 ANSWERS TO CHECK YOUR PROGRESS; 4.7 MODEL QUESTIONS; BLOCK III: 1.1 LEARNING OBJECTIVES; 1.2 INTRODUCTION; 1.3WHAT IS INFORMATION SECURITY? ; 1.4 MODELS FOR DISCUSSING SECURITY ISSUES; 1.5 THE PARKERIAN HEXAD; 1.6 ATTACKS; 1.7 THREATS, VULNERABILITIES AND RISK; 1.8 CONTROLS; 1.9 DEFENSE IN DEPTH; 1.10 INFORMATION SECURITY IN THE REAL WORLD; 1.11 SUMMARY; 1.12 CHECK YOUR PROGRES; 1.13 ANSWERS TO CHECK YOUR PROGRES; 1.14 MODEL QUESTIONS; 2.1 LEARNING OBJECTIVES; 2.2 INTRODUCTION; 2.3 WHY IS INFORMATION SECURITY IMPORTANT? ; 2.4 INFORMATION, INFORMATION SECURITY AND INFORMATION SECURITY MANAGEMENT; 2.5 INFORMATION SECURITY IMPERATIVES AND INCENTIVES; 2.6 INFORMATION ASSETS; 2.7 PLANNING AN INFORMATION SECURITY MANAGEMENT SYSTEM; 2.8 Other approaches to iformatio security maagemet; 2.9 SETTING UP AN ISMS; 2.10 ISMS DOCUMENTATION; 2.11 RISK ASSESMENT AND ASSET IDENTIFICATION; 2.12 THE PDCA CYCLE; 2.13 SUMMARY; 2.14 CHECK YOUR PROGRESS; 2.15 ANSWERS TO CHECK YOUR PROGRESS; 2.16 MODEL QUESTIONS; 3.1 LEARNING OBJECTIVES; 3.2 ELECTRONIC COMMERCE; 3.3 HISTORY; 3.4 BUSINESS MODEL; 3.5 REVENUE MODEL; 3.6 CONCERNS; 3.7 SECURITY SOLUTIONS; 3.8 E-COMMERCE INDENTIFICATION AND IDENTIFICATION TYPES; 3.9 IDENTIFICATION, AUTHENTICATION AND AUTHORIZATION; 3.10 TYPES OF ECOMMERCE AUTHENTICATION; 3.11 TYPES OOF BIOMETRIC AUTHENTICATION; 3.12 OTHER FORMS OF AUTHENTICATION; 3.13 SECURE ELECTRONIC TRANSACTION; 3.14 ADDITIONAL SECURITY PRECAUTIONS; 3.15 DIGITAL SIGNATURES VERSUS INK ON PAPER SIGNATURES; 3.16 THE CURRENT STATE OF USE- LEGAL AND PRACTICAL; 3.17 INDUSTRY STANDARDS; 3.18 ANTIVIRUS SOFTWARE; 3.19 ISSUES OF CONCERN; 3.20 FIREWALL; 3.21 COMPUTER FORENSICS; 3.22 STEGANOGRAPHY; 3.23 SUMMARY; 3.24 CHECK YOUR PROGRESS; 3.25 ANSWERS TO CHECK YOUR PROGRESS; 3.26 MODEL QUESTIONS; 4.1 LEARNING OBJECTIVES; 4.2 INTRODUCTION; 4.3 COMPUTER SECURITY AND ETHICS; 4.4 ETHICAL ISSUES IN COMPUTER SECURITY; 4.5 INFORMATION PRIVACY AND ETHICS; 4.6 PRIVACY ISSUES IN MODERN DATA MANAGEMENT; 4.7 TACTICS TO ENSURE COMPUTER SECURITY AND MAINTAIN PRIVACY; 4.8 SUMMARY; 4.9 CHECK YOUR PROGRESS; 4.10 ANSWERS TO CHECK YOUR PROGRESS; 4.11 MODEL QUESTIONS; Refereces, Article Sources ad Cotributors
คำสำคัญ :   Information Security, Information Magement, Computer, Information Communication Technology, Cyber Security, Post-Graduate Diploma in Cyber Security
ผู้สร้างสรรค์/ผู้แต่ง/เจ้าของผลงาน :   Priyanka Tewari
เจ้าของผลงานร่วม :   Ashutosh Bahuguna, Group Captain Ashok Katariya, Commonwealth Educational Media Centre for Asia, Uttarakhand Open University
สื่อสำหรับบุคคลประเภท :   ครู / อาจารย์, นักเรียน / นักศึกษา, ทั่วไป, ผู้ปกครอง
ระดับชั้น :   ปริญญาตรี , ปริญญาโท, ปริญญาเอก, การศึกษาตามอัธยาศัย
สาขาวิชาของสื่อ :   วิทยาศาสตร์, การงานอาชีพและเทคโนโลยี
ลักษณะของสื่อ :   Textbooks, หนังสือ
ผลงานทั้งหมด
1
ผู้เข้าชม
276
ดาวน์โหลด
1,804
ผลงานที่ได้รับความนิยมสูงสุด 5 อันดับ
Fundamentals of Information Security 273

ผลงาน 5 อันดับล่าสุด
Fundamentals of Information Security 4 สิงหาคม 2561
ผลงานที่ได้รับความนิยมสูงสุด 5 อันดับ
จำนวนข้อมูลจำแนกตามระดับชั้น
จำนวนข้อมูลจำแนกตามประเภทบุคคล
ผลงานทั้งหมด   
#    ชื่อเรื่อง    ผู้เข้าชม    ดาวน์โหลด #
1 Fundamentals of Information Security 273 1,804