Srishti BIBLOGRAPHY
Srishti BIBLOGRAPHY
Srishti BIBLOGRAPHY
PRIMARY SOURCE
SECONDARY SOURCE
BOOKS
7. K.D. Gaur A textbook on the Indian Penal Code, 1992, oxford &
IBH Publishing Co., New Delhi
13.Dr. Amita Verma “Cyber Crimes & Law”, First Edition, 2009
16.Salmond on the law of torts, ( Sweet & Maxwell, 17th Ed., 1997)
20.
JOURNALS
7.
WEBSITES
1. http://faculty.ist.psu.edu/bagby/43205S/T6/portalprojectfinishedver
sion.htm
2. http://www.scribd.com/doc/21173253/Mark-M-Pollitt-Cyber-
Terrorism-Fact-or-Fancy
3. http://www.naavi.org/cl_editorial_04/praveen_dalal/pd_cyber_terr
orism_oct25_04_02.htm
4. http://en.wikipedia.org
5. http://www.jref.com/japan/society/aum_shinrikyo.shtml
6. http://www.cyberspacelaws.com/crimes.asp
7. http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
8. http://www.webopedia.com/TERM/C/cyber.html
9. http://www.vakilno1.com/legalviews/cyber-crimes-in-india.html
10. http://www.droit-tic.com/pdf/chawki4.pdf
11. http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm
12. http://faculty.ist.psu.edu/bagby/43205S/T6/portalprojectfinishedver
sion.htm
13. http://www.techterms.com/definition/phreaking
14. http://www.scribd.com/doc/21173253/Mark-M-Pollitt-Cyber-
Terrorism-Fact-or-Fancy
15. http://jurisonline.in/?p=16887
16. http://unpan1.un.org/intradoc/groups/public/documents/APCITY/U
NPAN005846.pdf
17. http://www.ijser.org/researchpaper%5CCyber-Crimes-under-
Indian-IT-Laws.pdf
18. http://www.img.kerala.gov.in/docs/downloads/cyber
%20crimes.pdf
19. http://www.legalserviceindia.com/articles/article+2302682a.htm
20. http://works.bepress.com/cgi/viewcontent.cgi?
article=1013&context=mubashshir
21. http://meghpol.nic.in/acts/central/it_act_2000_2008_amendment.p
df
22. http://www.lexvidhi.com/article-details/admissibility-of-
information-technology-tools-as-evidence-511.html
23. http://www.iibf.org.in/documents/Cyber-Laws-chapter-in-Legal-
Aspects-Book.pdf
24. http://www.cidap.gov.in/documents/Cyber%20Crime.pdf
25. http://www.indlii.org/CyberLaw.aspx
OTHER SOURCES
2. Tan, Koon. Phishing and Spamming via IM. Internet Storm Center.
December 5th, 2006.
3. Ollmann, Gunter, THE PHISHING GUIDE: UNDERSTANDING
AND PREVENTING PHISHING ATTACKS:Technical Info,
2006
4. Vatis Michael A, “Cyber Attacks During the War on Terrorism: A
Predictive Analysis,” 22 September 2001 Institute For Security
Technology Studies At Dartmouth College.