Cyber Security in India

Cyber Security in India: Education, Research and Training (IITK Directions)

English | ISBN: 981151674X | 2020 | 118 Pages | EPUB, PDF | 25 MB

This book of `directions` focuses on cyber security research, education and training in India, and work in this domain within the Indian Institute of Technology Kanpur. IIT Kanpur`s Computer Science and Engineering Department established an 'Interdisciplinary Center for Cyber Security and Cyber Defense of Critical Infrastructures (C3I Center)' in 2016 with funding from the Science and Engineering Research Board (SERB), and other funding agencies. The work at the center focuses on smart grid security, manufacturing and other industrial control system security; network, web and data security; cryptography, and penetration techniques. The founders are involved with various Indian government agencies including the Reserve Bank of India, National Critical Information Infrastructure Protection Center, UIDAI, CCTNS under home ministry, Ministry of IT and Electronics, and Department of Science & Technology. The center also testifies to the parliamentary standing committee on cyber security, and has been working with the National Cyber Security Coordinator`s office in India. Providing glimpses of the work done at IIT Kanpur, and including perspectives from other Indian institutes where work on cyber security is starting to take shape, the book is a valuable resource for researchers and professionals, as well as educationists and policymakers.

Download:

http://longfiles.com/bfcbq4jwyxel/Cyber_Security_in_India_Education,_Research_and_Training_(IITK_Directions).pdf.html

[Fast Download] Cyber Security in India


Related eBooks:
Configuring Security Headers in ASP.NET and ASP.NET Core Applications
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
Hands-On Spring Security 5 for Reactive Applications
Open Data Exposed
Security Event Triage
Information Security Policy Development for Compliance
Hacker Cracker
The Agile/Security Development Life Cycle (A/SDLC): Integrating Security Functionality into the SDL
Protecting Your Internet Identity
Case Studies in Secure Computing: Achievements and Trends
Applied Cryptography and Network Security: 15th International Conference
Kidnap for Ransom: Resolving the Unthinkable
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.