Cyber Security for GTU 18 Course (V - Comp. /IT/Open Elec.-I - 3150714)

Cyber Security for GTU 18 Course (V - Comp. /IT/Open Elec.-I - 3150714) (Paperback, I. A. Dhotre)

Share

Cyber Security for GTU 18 Course (V - Comp. /IT/Open Elec.-I - 3150714)  (Paperback, I. A. Dhotre)

3.6
5 Ratings & 1 Reviews
₹168
170
1% off
i
Available offers
  • Bank Offer5% Unlimited Cashback on Flipkart Axis Bank Credit Card
    T&C
  • Bank Offer10% instant discount on SBI Credit Card EMI Transactions, up to ₹1,500 on orders of ₹5,000 and above
    T&C
  • Bank Offer10% off up to ₹1,000 on all Axis Bank Credit Card (incl. migrated ones) EMI Txns of ₹7,490 and above
    T&C
  • Bank Offer10% off on BOBCARD EMI Transactions, up to ₹1,500 on orders of ₹5,000 and above
    T&C
  • Delivery
    Check
    Enter pincode
      Delivery by5 May, Monday|55
      ?
    View Details
    Author
    Read More
    Highlights
    • Binding: Paperback
    • Publisher: Technical publication
    • ISBN: 9789390041848
    • Edition: FOURTH, 2023
    • Pages: 144
    Services
    • Cash on Delivery available
      ?
    Seller
    TechnicalPublications
    3.6
    • 7 Days Replacement Policy
      ?
  • See other sellers
  • Specifications
    Book Details
    Publication Year
    • 2023 july
    Table of Contents
    • Systems Vulnerability Scanning Overview of vulnerability scanning, Open Port / Service Identification, Banner / Version Check, Traffic Probe, Vulnerability Probe, Vulnerability Examples, OpenVAS, Metasploit.Network Defense tools Firewalls and Packet Filters: Firewall Basics, Packet Filter Vs Firewall, Packet Characteristic to Filter Web Application Tools Scanning for web vulnerabilities tools: Nikto, W3af, HTTP utilities - Curl, OpenSSL and Stunnel, Application Inspection tools Introduction to Cyber Crime and law Cyber Crimes, Types of Cybercrime, Hacking, Attack vectors, Cyberspace and Criminal Behavior, Clarification of TermsIntroduction to Cyber Crime Investigation Keyloggers and Spyware, Virus and Warms, Trojan and backdoors, Steganography, DOS and DDOS attack, SQL injection, Buffer Overflow, Attack on wireless Networks.
    University Books Details
    Stream
    • comp
    Frequently Bought Together
    1 Item
    168
    1 Add-on
    595
    Total
    763
    Ratings & Reviews
    3.6
    5 Ratings &
    1 Reviews
    • 5
    • 4
    • 3
    • 2
    • 1
    • 2
    • 1
    • 1
    • 0
    • 1
    1

    Unsatisfactory

    It's very small book in size like a nursery book...
    READ MORE

    Bhumi Vaja

    Certified Buyer, Bharuch District

    Sep, 2020

    0
    0
    Report Abuse
    Have doubts regarding this product?
    Safe and Secure Payments.Easy returns.100% Authentic products.
    You might be interested in
    Medical And Nursing Books
    Min. 50% Off
    Shop Now
    Politics Books
    Min. 50% Off
    Shop Now
    General Fiction Books
    Min. 50% Off
    Shop Now
    Industrial Studies Books
    Min. 50% Off
    Shop Now
    Back to top