Srishti BIBLOGRAPHY

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

BIBLOGRAPHY

PRIMARY SOURCE

STATUTES AND ENACTMENTS:

1. Information Technology Act, 2008

2. Information Technology Act , 2000

3. Constitution of India, 1949

SECONDARY SOURCE

BOOKS

1. Wolters kluwers: “Cyber Crime and Corporate Liability”,


published in 2008.

2. Vakul Sharma “Information Technology Law and Practice”,


Universal Law Publication, 2007.

3. Dorothy E. Denning and William E. Baugh, Jr., “Encryption and


Evolving Technologies: Tools of Organized Crime and Terrorism”,
Trends in organized crime, Vol. 3, September, 1997.

4. Nandan Kamath “Law Relating to Computers Internet & E-


commerce”, Universal law Publishing Co. , 5th Edn., 2012

5. Dr. Krishna Pal Malik “Computer and information technology


law”, Allahabad Law Agency
6. S.k. Verma and Raman Mittal “Legal Dimensions of cyberspace”,
Indian law Institute

7. K.D. Gaur A textbook on the Indian Penal Code, 1992, oxford &
IBH Publishing Co., New Delhi

8. Prof N.V. Paranjape ‘Criminology & Penology with Victimology’,


15th Edn., 2011.

9. Vakul Sharma “Information Technology Law and Practice”,


Universal Law Publication, Edn.3, 2011

10.Rohas Nagpal (President of Asian School of Cyber Laws)


“Fundamentals of Cyber Law”, Published in 2007.

11.V.D. Dudeja , CRIMES IN CYBERSPACE- SCAMS AND


FRAUDS (ISSUES AND REMEDIES) Commonwealth
Publishers, New Delhi, 2003. 

12.Pavan Duggal, “CyberLaw-The Indian Perspective”, (2002)

13.Dr. Amita Verma “Cyber Crimes & Law”, First Edition, 2009

14.Talat Fatima “Eastern book company Lucknow, First Edition, 2011

15.Vakul Sharma, Handbook of Cyber Laws (1st Edn. Macmillan


India Ltd., 2002)

16.Salmond on the law of torts, ( Sweet & Maxwell, 17th Ed., 1997)

17.Black’s Law Dictionary (6th Edn., 1990)

18.Suresh ‘I, Vishwanathan, “The Indian Cyberlaw”, 2001

19.Dr. Vishwanath Paranjape: Legal Dimensions of Cyber Crimes and


Preventive Laws (2010)

20.
JOURNALS

1. M.Zakaria Siddiqi, “Cyber Terrorism: Global Perspective”, Indian


Journal of Criminology and Criminalistics, Vol.22-23, 2001-02

2. R.C. Dikshit “Cyber Crime” CBI Bulletin Vol. 9. July 2001

3. Balwinder Singh: Cybercrime- A new Challenge for the police.


CBI Bulletin, vol.8, February 2000

4. Dr. S.C. Aggarwal Police Training in Cyber Crime: Need for a


Knowledge Management Cell, CBI Bulletin Volume 10, 2002

5. Dr. S.C Agarwal, “Training on Cyber Law, Cyber Crime and


Investigation By Police : Need of Awareness and Requirements”,
CBI Bulletin, Vol.9, February 2001

6. Kamlesh N.Agarwal ,murli D.Tiwari, “IT and Indian Legal


System”[New Delhi:Published by Rajiv Beri for Macmillan India
Ltd.]

7.

WEBSITES

1. http://faculty.ist.psu.edu/bagby/43205S/T6/portalprojectfinishedver
sion.htm
2. http://www.scribd.com/doc/21173253/Mark-M-Pollitt-Cyber-
Terrorism-Fact-or-Fancy
3. http://www.naavi.org/cl_editorial_04/praveen_dalal/pd_cyber_terr
orism_oct25_04_02.htm
4. http://en.wikipedia.org
5. http://www.jref.com/japan/society/aum_shinrikyo.shtml
6. http://www.cyberspacelaws.com/crimes.asp
7. http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
8. http://www.webopedia.com/TERM/C/cyber.html
9. http://www.vakilno1.com/legalviews/cyber-crimes-in-india.html
10. http://www.droit-tic.com/pdf/chawki4.pdf
11. http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm
12. http://faculty.ist.psu.edu/bagby/43205S/T6/portalprojectfinishedver
sion.htm
13. http://www.techterms.com/definition/phreaking
14. http://www.scribd.com/doc/21173253/Mark-M-Pollitt-Cyber-
Terrorism-Fact-or-Fancy
15. http://jurisonline.in/?p=16887
16. http://unpan1.un.org/intradoc/groups/public/documents/APCITY/U
NPAN005846.pdf
17. http://www.ijser.org/researchpaper%5CCyber-Crimes-under-
Indian-IT-Laws.pdf
18. http://www.img.kerala.gov.in/docs/downloads/cyber
%20crimes.pdf
19. http://www.legalserviceindia.com/articles/article+2302682a.htm
20. http://works.bepress.com/cgi/viewcontent.cgi?
article=1013&context=mubashshir
21. http://meghpol.nic.in/acts/central/it_act_2000_2008_amendment.p
df
22. http://www.lexvidhi.com/article-details/admissibility-of-
information-technology-tools-as-evidence-511.html

23. http://www.iibf.org.in/documents/Cyber-Laws-chapter-in-Legal-
Aspects-Book.pdf

24. http://www.cidap.gov.in/documents/Cyber%20Crime.pdf
25. http://www.indlii.org/CyberLaw.aspx

OTHER SOURCES

1. M E Kabay, Logic bombs, Part 1, Network World Security


Newsletter, 21/08/2002

2. Tan, Koon. Phishing and Spamming via IM. Internet Storm Center.
December 5th, 2006.
3. Ollmann, Gunter, THE PHISHING GUIDE: UNDERSTANDING
AND PREVENTING PHISHING ATTACKS:Technical Info,
2006
4. Vatis Michael A, “Cyber Attacks During the War on Terrorism: A
Predictive Analysis,” 22 September 2001 Institute For Security
Technology Studies At Dartmouth College.

You might also like