Page 250 - IT_Bulletin
P. 250
INFORMATION SECURITY & CYBER LAW
REFERENCE Author
BSONOoKS:Title & Publication Atul Kahate
William Stallings
1. Cryptography & Network Security, Published by Tata William Stallings
McGrawHills Whitman, Thomson
2. Network Security Essentials: Application & Standards,
Pearson
3. Cryptography and Network Security - Principles and
Practice , Pearson
4. Principles of Information Security
5. Principles of Cyber crime published by Cambridge Jonathan Clough
University Press Mamta Bhinani
6. Cyber Crime Law & Practice published by ICSI
7. https://cse29- Virtual Lab IIT
iiith.vlabs.ac.in/List%20of%20experiments.html HYDERABAD
8. http://swayam.gov.in Nptel
9. https://www.tutorialspoint.com Web resource
10. https://cybercrime.gov.in/ Web resource for
cyber crime reporting
11. e-books/e-tools/relevant software to be used as
recommended by AICTE/RGPV
INFORMATION SECURITY & CYBER LAW 250
REFERENCE Author
BSONOoKS:Title & Publication Atul Kahate
William Stallings
1. Cryptography & Network Security, Published by Tata William Stallings
McGrawHills Whitman, Thomson
2. Network Security Essentials: Application & Standards,
Pearson
3. Cryptography and Network Security - Principles and
Practice , Pearson
4. Principles of Information Security
5. Principles of Cyber crime published by Cambridge Jonathan Clough
University Press Mamta Bhinani
6. Cyber Crime Law & Practice published by ICSI
7. https://cse29- Virtual Lab IIT
iiith.vlabs.ac.in/List%20of%20experiments.html HYDERABAD
8. http://swayam.gov.in Nptel
9. https://www.tutorialspoint.com Web resource
10. https://cybercrime.gov.in/ Web resource for
cyber crime reporting
11. e-books/e-tools/relevant software to be used as
recommended by AICTE/RGPV
INFORMATION SECURITY & CYBER LAW 250