0% found this document useful (0 votes)
4 views

AIDA _ Topic wise Index

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

AIDA _ Topic wise Index

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

S.

Page
No. Topic Sub Topic No.
34 AI AI and Intellectual Property Rights 25
9 AI AI Announcements in Union Budget 2023 7
207 AI AI Methods 113
30 AI AI Versus Ethics & Morality 23
31 AI AI Versus Law and Compliance 24
205 AI AI: Brief Description 112
2 AI AI: Characteristics 4
32 AI AI’s in the Legal Industry 24
209 AI Benefits of AI in India 114
33 AI Challenges in AI adoption in Law and Compliance 24
204 AI Data Protection and AI: Laws and Regulations 111
6 AI Emergence of AI in a Modern it World 6
3 AI Evolution of AI 5
206 AI Evolution of AI 112
4 AI Examples of AI 6
11 AI Future of AI in India 9
8 AI Growth of AI vis-a-vis Indian Vision: Glimpse of Future of India 7
10 AI Increase in AI Usage in Various Sectors 8
22 AI Increased AI Interest in India 17
208 AI India and AI 113
7 AI Influence on Modern Society – AI 7
1 AI Introduction – AI 4
23 AI Major Challenges of AI in India 18
24 AI Policy Changes Needed for AI in India 19
36 AI Recent Indian case laws related to AI and intellectual property 28
35 AI Requirement of Amendment in Laws 27
38 AI Right to Privacy (Aadhaar Case) 31
37 AI Steps of Government of India on AI: A Snap Shot 29
210 AI Steps taken by the Government 114
41 AI The Facial Recognition Case 31
40 AI The Gig Economy Case 31
5 AI Types of AI 6
Amway India Enterprises Pvt Ltd vs. 1Mg Technologies Pvt Ltd &
Another (2019) - non-compliance of the due diligence requirements as
per the Intermediary Guidelines and failure to adhere to their own
179 Case Law policies would make the ecommerce platforms liable 101

Anil Kumar Srivastava vs. Addl Director, MHFW (2005) - forged the
200 Case Law signature & forged document 109
S. Page
No. Topic Sub Topic No.

Avnish Bajaj v. State (NCT) of Delhi, (2008) 150 DLT 769 -


intermediaries are not obligated to actively track every piece of
information posted on their platforms, they have a duty to promptly
645 Case Law remove any illegal content after receiving notice from the authorities 309

Avnish Bajaj vs. State and the Amendment to the IT Act 2008 - Safe
171 Case Law Harbour 98
CBI v. Arif Azim, (2008) 150 DLT 769 - Section 66C of the IT Act,
2000, which addresses identity theft and the illegal and dishonest use
of electronic passwords, signatures, and other personal identifying
648 Case Law elements 310
Christian Louboutin SAS vs. Nakul Bajaj and Ors (2018) - failing to
observe ‘due diligence’, could amount to ‘conspiring, aiding, abetting or
176 Case Law inducing’ unlawful conduct 100
Gagan Harsh Sharma vs. State of Maharashtra (2018) - issue of non-
201 Case Law bailable and non-compoundable offences & bailable and compoundable 110
Kalandi Charan Lenka vs. the State of Odisha (2017) - guilty of
199 Case Law cyberstalking 109
Kent Ro Systems Ltd & Anr vs. Amit Kotak & Ors (2017) - intermediary,
before posting any information on its computer resources is required to
satisfy itself that the same does not infringe the intellectual property
175 Case Law rights of any person 100
185 Case Law Kumar vs. Whiteley (1991) - unauthorized use of broadband Internet 102
M/S Luxottica Group S.P.A & Another vs. M/S Mify Solutions Pvt Ltd &
Ors (2019) - trademark infringement suit and sells counterfeit products
178 Case Law online 101

MC Pneumatics (India) Pvt. Ltd. vs. Jogesh Kwatra, CM APPL. No. 33474
of 2016 - The court emphasized that after obtaining notification from
the person who is impacted or a court order, intermediaries must take
immediate action to remove unlawful information. attention to the
necessity for a balance between the protection of free expression and
647 Case Law the protection of reputation and privacy. 309
My Space Inc. vs. Super Cassettes Industries Ltd. (2017) - actual or
specific knowledge of the existence of infringing content on their
174 Case Law website from content owners 100
S. Page
No. Topic Sub Topic No.
Poona Auto Ancillaries Pvt. Ltd., Pune vs. Punjab National Bank, HO New
184 Case Law Delhi & Others (2018) - Responding to Phishing mail 102
39 Case Law Shamnad Basheer vs. Union of India - NLSIU candidate Admission 31
Shreya Singhal v. Union of India (AIR 2015 SC 1523) - S.66A to be
unconstitutional as it was ambiguous, overbroad, and unclear, thus
infringing the fundamental right of free speech and expression
644 Case Law guaranteed under Art. 19(1)(a) of the Constitution 308
Shreya Singhal vs. Union of India (2015) - directions to intermediaries
173 Case Law to disable specific content 99
State of Tamil Nadu v. Suhas Kutti, CC No. 4680 of 2004 - application
of IPC provisions to cases of online harassment and has brought
attention to the necessity for legislation and regulations to deal with
646 Case Law the particular problems created by cybercrime 309
Syed Asifuddin and Ors. v. State of Andhra Pradesh and Anr. [Andhra
High Court, reported as 2005 CriLJ 4314] - reprograming the handset
by alteration of ESN by service providers like TATA Indicom, is an
643 Case Law offence under Section 65 of the Information Technology Act, 2000 308
641 Case Study Case Study - Mobile Security 307
642 Case Study Case Study - Pune Citibank mphasis Call Centre Fraud 308
Chatbots and Virtual
13 Assistance Advantages of Using ChatBots and Virtual Assistance 11
Chatbots and Virtual
12 Assistance Chatbots and Virtual Assistance: Boon or Bane 10
Chatbots and Virtual
15 Assistance Demerits of Using ChatBots and Virtual Assistance 12
Chatbots and Virtual
14 Assistance Latest Trends – Chatbots and Virtual Assistance 12
197 Companies Act Companies Act, 2013 – Cyber threats and Cyber Law 109
278 Computer Forensics Computer Forensics 155
277 Computer Forensics Computer Forensics and Digital Evidence 155
282 Computer Forensics Computer Forensics Vis -A- Vis Cyber Security 157
839 Computer Forensics How does computer forensics work? 371
837 Computer Forensics Importance - computer forensics 371
283 Computer Forensics Investigations vide Computer Forensics 157
281 Computer Forensics Role of Computer Forensics 157
280 Computer Forensics Types of Computer Forensics 156
838 Computer Forensics Types of computer forensics - Data Analytics 371
S. Page
No. Topic Sub Topic No.
Usage of computer forensics software tools to cross-validate findings in
836 Computer Forensics computer evidence- related cases 370
279 Computer Forensics Use of Computer Forensics 156
520 Computer H&S 3D Printing 265
529 Computer H&S 5G 266
570 Computer H&S Advantages of Online Systems 275
572 Computer H&S Advantages of Real-Time Systems 275
549 Computer H&S Application software 271
576 Computer H&S Application Software 276
545 Computer H&S Arithmetic and Logic Unit (ALU) 269
517 Computer H&S Artificial Intelligence (AI) and Machine Learning 264

557 Computer H&S Artificial Intelligence (AI): Ushering in intelligent enterprise systems 272
568 Computer H&S Batch Processing 274
527 Computer H&S Blockchain 266
Blockchain: Augmenting enterprise solutions with transparency,
556 Computer H&S efficiency and security 272
495 Computer H&S Categories: Types of Computer System 258
494 Computer H&S Characteristics of a Computer 257
582 Computer H&S Closed source 277
563 Computer H&S Code quality 274
531 Computer H&S Components of Computer System 266
532 Computer H&S Computer hardware 266
544 Computer H&S Computer Peripherals – Inputs, Output, and Storage Devices 269
533 Computer H&S Computer software 267
548 Computer H&S Computer Software : An Introduction 270
541 Computer H&S Computer Storage Capacities 268
493 Computer H&S Computer System: Concept 256
514 Computer H&S Computing Power 264
546 Computer H&S Control Unit 269
530 Computer H&S Cybersecurity 266

560 Computer H&S Cybersecurity: A Key consideration when building enterprise solutions 273
516 Computer H&S Datafication 264
519 Computer H&S Digital Trust 265
551 Computer H&S Driver software 271
524 Computer H&S Edge Computing 265
512 Computer H&S Emerging Technologies 262
Emerging technologies related to computer systems and information and
513 Computer H&S communication technologies 264
S. Page
No. Topic Sub Topic No.
583 Computer H&S Examples of application software 277
518 Computer H&S Extended Reality 265
579 Computer H&S Freeware 277
577 Computer H&S Function of application software 276
521 Computer H&S Genomics 265
509 Computer H&S Handheld game console 262
528 Computer H&S Internet of Things (IoT) 266
492 Computer H&S Introduction - Computer Hardware And Software 256
575 Computer H&S Key differences between online and real-time systems 275
559 Computer H&S Language and framework trends for developing enterprise apps 273
506 Computer H&S Laptops 261
571 Computer H&S Limitations of Online Systems 275
573 Computer H&S Limitations of Real-Time Systems 275
534 Computer H&S Liveware 267
562 Computer H&S Low-Code Development 273
498 Computer H&S Mainframe 259
547 Computer H&S Memory Registers 270
501 Computer H&S Microcomputers 260
504 Computer H&S Microcontroller 260
511 Computer H&S Microcontrollers 262
552 Computer H&S Middleware 272
500 Computer H&S Midrange Computers 259
555 Computer H&S Mixed Reality (MR): High potential in enterprise solutions 272
505 Computer H&S Mobile Computers 261
566 Computer H&S Multi-Processing 274
565 Computer H&S Multi-Programming 274
507 Computer H&S Netbook 261
522 Computer H&S New Energy Solutions 265
569 Computer H&S On-Line and Real Time Processing 275
Online and real-time systems are two different types of computer
574 Computer H&S systems used in organizations 275
581 Computer H&S Open-source 277
564 Computer H&S Outsourcing 274
503 Computer H&S Personal Computer or PC 260
535 Computer H&S Primary and Secondary Storage 267
553 Computer H&S Programming software 272
561 Computer H&S Progressive Web Applications (PWAs) 273
497 Computer H&S Quantum Computer 259
525 Computer H&S Quantum Computing 266
S. Page
No. Topic Sub Topic No.
536 Computer H&S RAM (Random Access Memory) - Primary Storage 267
542 Computer H&S Raw Capacity 268
523 Computer H&S Robotic Process Automation (RPA) 265
537 Computer H&S ROM (Read-Only Memory) - Primary storage 267
540 Computer H&S Secondary memory - Characteristics 268
538 Computer H&S Secondary memory - meaning 268
539 Computer H&S Secondary memory - Types 268
499 Computer H&S Server Computer 259
580 Computer H&S Shareware 277
515 Computer H&S Smarter Devices 264
510 Computer H&S Smartphone 262
554 Computer H&S Software Trends 272
496 Computer H&S Supercomputer 258
550 Computer H&S System software 271
508 Computer H&S Tablet 262
558 Computer H&S The Internet of Things (IoT) 272
567 Computer H&S Time Sharing 274
578 Computer H&S Types of application software 277
543 Computer H&S Usable Capacity 269
526 Computer H&S Virtual Reality and Augmented Reality 266
502 Computer H&S Workstation Computer 260
202 Criminal Law Criminal Law is proposed to be replaced from New Legislations 110
303 Cyber Attack Cyber attack by Tamil Tigers 170
305 Cyber Attack Cyber Attack on Estonia 171
300 Cyber Attack Cyber Attacks in Middle East 170
301 Cyber Attack India and Pakistan Conflict - Cyber Attacks 170
307 Cyber Attack Indian Law & Cyber Terrorism 171
308 Cyber Attack Punishment for cyber terrorism 172
302 Cyber Attack Retribution by China 170
306 Cyber Attack Sony PlayStation Network, Microsoft’s Xbox Live network case 171
304 Cyber Attack Yugoslavia Conflict 170
241 Cyber Crime Buffer overflow 142
Central Government Initiative on Strengthening Mechanism to Lever
258 Cyber Crime Cyber Crimes 144
259 Cyber Crime Citizen Financial Cyber Fraud Reporting and Management System 145
276 Cyber Crime Common cyber-crimes of 2023-2024 154
242 Cyber Crime Cracking 142
238 Cyber Crime Cyber Crime vis-a-vis Indian Scenario 141
243 Cyber Crime Data Didling 142
S. Page
No. Topic Sub Topic No.
271 Cyber Crime Data hiding analysis 153
267 Cyber Crime Documentation – Cyber Crimes 151
270 Cyber Crime Examination – Cyber Crimes 152
274 Cyber Crime File analysis 154
India is the 80th most targeted country worldwide in cybercrime:
239 Cyber Crime Report 141
Initiatives to Regulate and Control Cyber Crimes: Governmental and Law
257 Cyber Crime Enforcement Agencies 143
236 Cyber Crime Introduction - Cyber Crimes And Investigation Procedures 140
264 Cyber Crime Investigation of Cyber Crimes under Indian Laws 149
272 Cyber Crime Log files analysis 154
244 Cyber Crime Malware 142
269 Cyber Crime Methods to preserve the Digital Evidence 151
237 Cyber Crime Overview of Cyber Crimes 140
245 Cyber Crime Phishing 142
275 Cyber Crime Presentation – Cyber Crimes 154
268 Cyber Crime Preservation – Cyber Crimes 151
261 Cyber Crime Process of Reporting a Cyber Crime 146
266 Cyber Crime Process of search & arrest – Cyber Crimes 149
260 Cyber Crime Reporting of Cyber Crime 145
246 Cyber Crime Rootkit 142
247 Cyber Crime Salami Attack 143
248 Cyber Crime Sniffer 143
249 Cyber Crime Social Engineering 143
250 Cyber Crime Spoofing 143
251 Cyber Crime Spyware 143
263 Cyber Crime State Nodal Officer and Grievance Officer – Cyber Crimes 149
252 Cyber Crime Steganography 143
273 Cyber Crime Time frame analysis 154
240 Cyber Crime Tools and Techniques used to Commit Cyber Crimes 142
253 Cyber Crime Trojan 143
254 Cyber Crime Virus 143
265 Cyber Crime Who can investigate? – Cyber Crimes 149
262 Cyber Crime Work Flow for Reporting a Cyber Crime 147
255 Cyber Crime Worm 143
256 Cyber Crime Zombie 143
52 Cyber Security 10 Steps to ensure Cyber Security 40
56 Cyber Security Additional Challenges and Limitations: Recent Trends 44
25 Cyber Security AI and Cyber Security 20
S. Page
No. Topic Sub Topic No.
49 Cyber Security Antivirus - Cyber Security Techniques 39
379 Cyber Security Arrangement for continuous surveillance 195
46 Cyber Security Authentication - Cyber Security Techniques 38
28 Cyber Security Benefits of AI in Cyber Security 21
Bharat National Cyber Security Exercise 2023: Elevating India’s
70 Cyber Security Cybersecurity Preparedness to New Heights 58
53 Cyber Security Challenges and Restrictions - Cyber Security 41
54 Cyber Security Common Kinds of Cyber-attacks 42
381 Cyber Security Comprehensively address network and database security 196
79 Cyber Security Computer Emergency Response Team (CERT-In) 66
407 Cyber Security Computer Emergency Response Team (CERT-In) - Detailed 211
383 Cyber Security Cyber Crisis Management Plan 196
61 Cyber Security Cyber expertise is coming to the Boardroom 49
81 Cyber Security Cyber Regulations Appellate Tribunal (CRAT) 67
409 Cyber Security Cyber Regulations Appellate Tribunal (CRAT) - Detailed 212
86 Cyber Security Cyber Resilient Organizational Study (A Caselet) 70
42 Cyber Security Cyber Security 36
203 Cyber Security Cyber Security Framework (NCFS) 111
44 Cyber Security Cyber Security Fundamentals 37
63 Cyber Security Cyber Security Policies - National and International 49
Cyber Security Policy to be distinct from the broader IT policy / IS
378 Cyber Security Security Policy of a bank 195
71 Cyber Security Cyber Security Policy: International Standards (ISO/IEC) 58
384 Cyber Security Cyber security preparedness indicators 196
45 Cyber Security Cyber Security Techniques 38
75 Cyber Security Cyber Security: Legal and Compliance Assessment 61
76 Cyber Security Cyber Security: Legal Assessment 62

78 Cyber Security Cyber Security: Major Regulating Bodies and Compliance Requirements 66
85 Cyber Security Cyber Security: Recent Government Initiatives in India 68
Cyber-security awareness among stakeholders / Top Management /
388 Cyber Security Board 197
Digital Personal Data Protection Act, 2023: New Paradigm of Data
77 Cyber Security Privacy and Compliance 65
48 Cyber Security Digital Signatures - Cyber Security Techniques 39
29 Cyber Security Disadvantages of AI in Cyber Security 22
68 Cyber Security Draft National Cyber Security Strategy 57
67 Cyber Security DSCI – National Cyber Security Strategy Report, 2020 56
73 Cyber Security Elements of Effective Cyber Security Policy 60
S. Page
No. Topic Sub Topic No.
26 Cyber Security Emergence of AI in Cyber Security 21
47 Cyber Security Encryption - Cyber Security Techniques 38
382 Cyber Security Ensuring Protection of customer information 196
50 Cyber Security Firewall - Cyber Security Techniques 39
395 Cyber Security Governance - Cyber Security 204
87 Cyber Security How organizations measured the increase in severity of incidents 72
396 Cyber Security Identify - Cyber Security 205
389 Cyber Security Implications of RBI Requirements - Cyber Security 197
410 Cyber Security Insurance Regulatory and Development Authority (IRDAI) 212
72 Cyber Security International Convention on Cyberspace 60
74 Cyber Security International Convention on Cyberspace: A Brief Timeline 60
International Principles Governing AI, Cyber Security and Cyberspace:
404 Cyber Security An Overview 209
83 Cyber Security IRDAI - Regulating Body - Cyber Security 67
380 Cyber Security IT architecture should be conducive to security 195
62 Cyber Security Managing Third-Party risk to stay resilient 49
Master Direction on Information Technology Governance, Risk, Controls
390 Cyber Security and Assurance Practices 199
398 Cyber Security Monitoring and Detection - Cyber Security 208
National Critical Information Infrastructure Protection Center
80 Cyber Security (NCIIPC) 66
National Critical Information Infrastructure Protection Center
408 Cyber Security (NCIIPC) - Detailed 211
65 Cyber Security National Cyber Security Policy -2013 50
69 Cyber Security National Cyber Security Strategy 2023: Latest Updates 57
66 Cyber Security National Cyber Security Strategy: Recent Trends 56
405 Cyber Security OECD AI Principles: Overview 210
387 Cyber Security Organizational arrangements 197
406 Cyber Security Other Applicable Regulatory Framework 211
402 Cyber Security Periodic Audit - Cyber Security 209
397 Cyber Security Protection - Cyber Security 205
88 Cyber Security Ransomware and how much it costs organizations 72
375 Cyber Security RBI and Artificial Intelligence: Evolving Governance 193
377 Cyber Security RBI Cyber Security Circular 195
376 Cyber Security RBI Cyber Security Framework 194
374 Cyber Security RBI Regulations governing AI, Cyber Security and Cyberspace 192
RBI’s Updated Master Direction: Navigating the Digital Landscape
391 Cyber Security Safely 200
64 Cyber Security Requirement of Cyber Security Policies 50
S. Page
No. Topic Sub Topic No.
399 Cyber Security Response and Recovery - Cyber Security 208
57 Cyber Security Rise of AI Threats and Cybersecurity: Predictions for 2024 48
58 Cyber Security Rise of Specialized Language Models 48
82 Cyber Security SEBI - Regulating Body - Cyber Security 67
SEBI Cyber Security Guidelines, 2023 – Cyber Security and Cyber
394 Cyber Security Resilience framework for Portfolio Managers 203
393 Cyber Security SEBI Regulations Governing AI, Cyber Security and Cyberspace 201
400 Cyber Security Sharing of information - Cyber Security 208
385 Cyber Security Sharing of information on cyber-security incidents with RBI 196
43 Cyber Security Significance of Cyber Security 36
Solution – Confrontation Strategy to Challenges and Limitations of
55 Cyber Security Cyber Attack 43
60 Cyber Security Spike in Third-Party Data Breaches 48
51 Cyber Security Steganography - Cyber Security Techniques 40
386 Cyber Security Supervisory Reporting framework 197
90 Cyber Security Supply chain attacks and disaster recovery 74
Telecom Regulatory Authority of India (TRAI) & Department of
411 Cyber Security Telecommunications (DoT) 213
392 Cyber Security Thematic Objectives of the New RBI Master Directions 201
59 Cyber Security Threat Actors will use AI to get ahead 48
84 Cyber Security TRAI & DoT - Regulating Body - Cyber Security 67
401 Cyber Security Training - Cyber Security 209

91 Cyber Security Types of attacks for which organizations have incident response plans 74
27 Cyber Security Use of AI in Cyber Security 21
403 Cyber Security Vendors or Service Providers - Cyber Security 209
89 Cyber Security Why organizations infected by ransomware refused to pay a ransom 73
136 Cyber Threats Advanced Persistent Threats 89
122 Cyber Threats Attacks on IoT Devices 88
133 Cyber Threats Backdoors 89
101 Cyber Threats Basic elements of Cyber Terrorism 84
134 Cyber Threats Bots 89
114 Cyber Threats Brute force 87
142 Cyber Threats Covid-Themed Phishing Attacks 90
162 Cyber Threats Cryptography 96
98 Cyber Threats Cyber Crime 83
99 Cyber Threats Cyber Terrorism 83
100 Cyber Threats Cyber Terrorism vis-à-vis Cyber Crime 84
152 Cyber Threats Cyber Threat Hunting and Digital Forensics 93
S. Page
No. Topic Sub Topic No.
94 Cyber Threats Cyber Threats 82
97 Cyber Threats Cyber Warfare 82
123 Cyber Threats Data Breaches 88
137 Cyber Threats Data Centre Disrupted by Natural Disaster 89
125 Cyber Threats Data Destruction 89
124 Cyber Threats Data Manipulation 88
95 Cyber Threats Definition of Cyber Threats 82
115 Cyber Threats Denial of Service 87
116 Cyber Threats Dictionary attacks 87
156 Cyber Threats Digital Forensics 95
158 Cyber Threats Digital Intellectual Property 95
160 Cyber Threats Digital Rights Management (DRM) 96
164 Cyber Threats Digital Signature Technology 96
163 Cyber Threats Digital Watermark Technology 96
147 Cyber Threats Distributed Denial of Service (DDoS) Attacks 91
106 Cyber Threats DNS Spoofing 86
138 Cyber Threats Drive-by Downloads 89
165 Cyber Threats Electronic Marking 96
118 Cyber Threats File Inclusion attacks 87
155 Cyber Threats Hunting Steps 94
105 Cyber Threats Injection attacks 86
144 Cyber Threats Insider Threats 91
139 Cyber Threats Intellectual Property Theft 89
92 Cyber Threats Introduction – Cyber threats and Cyber Law 80
181 Cyber Threats Laws Applicable to AI and Cyber Laws 102
102 Cyber Threats Legal Provisions dealing with Cyber terrorism 84
Legal/Regulatory regime of “Intermediary/Online Platform Liability” in
168 Cyber Threats India 97
167 Cyber Threats Liability of Online Platforms 97
126 Cyber Threats Malvertising 89
150 Cyber Threats Malvertising 92
110 Cyber Threats Malware 87
111 Cyber Threats Malware on Mobile Apps 87
119 Cyber Threats Man in the Middle Attacks 87
108 Cyber Threats Phishing 86
149 Cyber Threats Phishing 92
146 Cyber Threats Polyglot Files 91
93 Cyber Threats Pros and Cons of Information Technology 81
121 Cyber Threats Ransomware 88
S. Page
No. Topic Sub Topic No.
143 Cyber Threats Ransomware Attacks 90
141 Cyber Threats Recent Cybers Threats - 2022 90
127 Cyber Threats Rogue Software 89
166 Cyber Threats Security Features of Operating System 97
107 Cyber Threats Session Hijacking 86
148 Cyber Threats Social Engineering 92
96 Cyber Threats Sources of Cyber Threats 82
109 Cyber Threats Spear Phishing 87
112 Cyber Threats Spyware 87
157 Cyber Threats Steps of Digital Forensics 95
140 Cyber Threats Supply Chain Attacks 89
145 Cyber Threats Supply Chain Attacks 91
129 Cyber Threats System-Based Attacks 89
161 Cyber Threats Technical Protection Measures (TPM) 96
153 Cyber Threats Threat Hunting Investigations 93
154 Cyber Threats Threat Hunting Techniques 94
132 Cyber Threats Trojan horse 89
120 Cyber Threats Trojans 87
103 Cyber Threats Types of Cyber Threats/ Attacks 85
128 Cyber Threats Unpatched Software 89
117 Cyber Threats URL Interpretation 87
130 Cyber Threats Virus 89
159 Cyber Threats Ways for Protection of Digital / Intellectual Property 96
104 Cyber Threats Web-Based Attacks 86
113 Cyber Threats Wiper Attacks 87
131 Cyber Threats Worm 89
135 Cyber Threats Zero-Day Exploits 89
151 Cyber Threats Zero-Day Exploits 92
20 Cyberspace Advantages of AI in cyberspace 15
21 Cyberspace Challenges and Opportunities of AI 16
16 Cyberspace Need and Significance of AI in Cyberspace 13
19 Cyberspace Organizations operating online can benefit from AI 15
18 Cyberspace Recent Example of Cyber Attacks 14
17 Cyberspace Requirement of AI in Cyberspace 14
489 Data Analysis Examples of Data Analysis 244
491 Data Analysis Future of network analysis in legal history 248
485 Data Analysis I C - Customer Analysis 243
486 Data Analysis II C - Competitor Analysis 244
487 Data Analysis III C - Corporation Analysis 244
S. Page
No. Topic Sub Topic No.
488 Data Analysis Network Analysis and Law 244
490 Data Analysis Research Case of Network Analysis in Law 245
484 Data Analysis Triple C Theory and Data Analysis 243
821 Data Analytics Acquisition - file system forensics process 364
437 Data Analytics Advantage of Legal Data Analytics 222
759 Data Analytics Apache Spark 344
782 Data Analytics Artifacts 348
804 Data Analytics Authenticode 356
770 Data Analytics Bare metal restores 346
748 Data Analytics Benefits of Data Analytics 341
442 Data Analytics Billing analytics 223
773 Data Analytics Business Continuity/Disaster Recovery (BCDR) 346
439 Data Analytics Business of Law Analytics vis-a-vis Practice Law Analytics 223
446 Data Analytics Case Analytics – Data Analytics 224
806 Data Analytics Certificate Authorities (CA) 357
812 Data Analytics Chain of Custody 360
772 Data Analytics Cloud virtualization 346
432 Data Analytics Cohort analysis 221
775 Data Analytics Collection Options - Data Analytics 347
783 Data Analytics Collection Steps 349
793 Data Analytics Computer Evidence Processing Steps 351
801 Data Analytics Computer Image Verification and Authentication 356
445 Data Analytics Contract Analytics – Data Analytics 224
451 Data Analytics Contract Review and Management 225
784 Data Analytics Controlling Contamination: The Chain of Custody 349
417 Data Analytics Data Analysis and Computing 219
423 Data Analytics Data Analysis Steps 220
413 Data Analytics Data Analytics 218
416 Data Analytics Data Analytics and Statistics 219
429 Data Analytics Data Analytics Techniques 221
435 Data Analytics Data Analytics Tools 221
743 Data Analytics Data Analytics Types 340
418 Data Analytics Data mining 219
420 Data Analytics Data Processing 219
766 Data Analytics Data Recovery Ethics 345
763 Data Analytics Data Recovery Procedures and Ethics 344
749 Data Analytics Data Recovery Tools 341
425 Data Analytics Descriptive Analytics 220
744 Data Analytics Descriptive Analytics 340
S. Page
No. Topic Sub Topic No.
426 Data Analytics Diagnostic Analytics 220
745 Data Analytics Diagnostic Analytics 340
764 Data Analytics Digital Ethics 344
807 Data Analytics Digital ID 357
803 Data Analytics Digital IDS and Authentication Technology 356
753 Data Analytics Disk Drill 342
809 Data Analytics Document A Chain of Custody and Its Importance 358
789 Data Analytics Duplication and Preservation of Digital Evidence 351
750 Data Analytics EaseUS Data Recovery Wizard 342
800 Data Analytics Evidence Collection - Digital Crime Scene 355
810 Data Analytics Evidence Collection - Digital ID 358
797 Data Analytics Evidence Collection Procedure 354
811 Data Analytics Evidence Marking and Packaging 359
799 Data Analytics Evidence Notebook 354
788 Data Analytics Evidence Search and Seizure 350
415 Data Analytics Evolution of Data Analytics 219
761 Data Analytics Excel 344
818 Data Analytics EXT File Systems 363
823 Data Analytics Extraction - file system forensics process 364
431 Data Analytics Factor analysis 221
816 Data Analytics FAT 32 File System 362
815 Data Analytics FAT File System 362
819 Data Analytics File format 364
768 Data Analytics File Restore 345
795 Data Analytics Forensic Evidence 353
780 Data Analytics Freezing the Scene 348
Gathering Evidence- Precautions, Preserving And Safely Handling
774 Data Analytics Original Media For Its Admissibility 346
419 Data Analytics Google Web Search 219
450 Data Analytics Help perform Due Diligence 225
781 Data Analytics Honey Potting 348
808 Data Analytics How Authenticode works with VeriSign Digital IDs? 358
438 Data Analytics Implementing Data Analytics to Legal Practice 223
828 Data Analytics Importance - Data privacy 367
798 Data Analytics Incident Coordinator 354
412 Data Analytics Introduction – Data Analytics and Law 218
741 Data Analytics Introduction to Data Analytics 340
436 Data Analytics Introduction to Legal Analytics 222
447 Data Analytics Introduction to Machine Learning for Lawyers 224
S. Page
No. Topic Sub Topic No.
414 Data Analytics Kinds of Data collected by Company 219
794 Data Analytics Legal Aspects of Collecting and Preserving Computer 353
796 Data Analytics Legal Requirements – Forensic Evidence 353
453 Data Analytics Legal Research – Data Analytics 226
778 Data Analytics Live Forensics 348
771 Data Analytics Local virtualization 346
443 Data Analytics Matter analytics 224
787 Data Analytics Methodology Development 350
779 Data Analytics Methods of Collection 348
433 Data Analytics Monte Carlo simulations 221
817 Data Analytics NTFS File System 363
776 Data Analytics Obstacles 347
444 Data Analytics Practice of Law Analytics 224
452 Data Analytics Predict Legal Outcomes 225
427 Data Analytics Predictive Analytics 220
746 Data Analytics Predictive Analytics 341
421 Data Analytics Predictive Modeling 219
428 Data Analytics Prescriptive Analytics 220
747 Data Analytics Prescriptive Analytics 341
790 Data Analytics Preserving the Digital Crime Scene 351
742 Data Analytics Process of Data Analytics 340
805 Data Analytics Public Key Cryptography 357
758 Data Analytics Python 343
757 Data Analytics R Programming 343
762 Data Analytics RapidMiner 344
785 Data Analytics Reconstructing the Attack 349
824 Data Analytics Reconstruction - file system forensics process 365
831 Data Analytics Recover Swap Files/Temporary Files/Cache Files 368
826 Data Analytics Recovery of Internet Usage Data 365
751 Data Analytics Recuva 342
430 Data Analytics Regression analysis 221
825 Data Analytics Reporting - file system forensics process 365
827 Data Analytics Requirements of remote recovery 366
834 Data Analytics Retrieving cached files 369
833 Data Analytics Retrieving deleted files 369
835 Data Analytics Retrieving files in unallocated space 369
449 Data Analytics Review Documents and Legal Research 224
765 Data Analytics Role of Digital Ethics in Data Storage 345
754 Data Analytics R-Studio 342
S. Page
No. Topic Sub Topic No.
791 Data Analytics Safeback – Data Evidence 351
760 Data Analytics SAS 344
786 Data Analytics Searching and Seizing 349
792 Data Analytics Snapback – Data Evidence 351
814 Data Analytics Some commonly used file systems 362
802 Data Analytics Special Needs of Evidential Authentication 356
440 Data Analytics Spend analytics 223
752 Data Analytics Stellar Data Recovery 342
820 Data Analytics Steps in the file system forensics process 364
756 Data Analytics Tableau Public 343
434 Data Analytics Time series analysis 221
755 Data Analytics Tips for using Data recovery tool effectively 342
813 Data Analytics Transfer of Evidence to Property Room 361
424 Data Analytics Types of Data Analytics 220
767 Data Analytics Types of Data Recovery 345
448 Data Analytics Use of AI and Machine Learning in Law 224
822 Data Analytics Validation and discrimination - file system forensics process 364
441 Data Analytics Vendor analytics 223
422 Data Analytics Visualization 219
777 Data Analytics Volatile Evidence 348
769 Data Analytics Volume Restore 346
832 Data Analytics Ways to Recover Deleted Temp Files 369
What are some of the challenges businesses face when protecting user
830 Data Analytics privacy? 368
What are some of the challenges users face when protecting their
829 Data Analytics online privacy? 367
482 Data Assessment Direct Assessment - Data Assessment 243
483 Data Assessment Indirect Assessment - Data Assessment 243
481 Data Assessment Triple C Theory and Data Assessment 242
Civil Liability in case of data, computer database theft, privacy violation
216 Data Protection etc. 117
Criminal Liability in case of data, computer database theft, privacy
217 Data Protection violation etc. 117
211 Data Protection Data Protection: Indian Legal Perspective 115
212 Data Protection Indian Laws for Data Protection 116
213 Data Protection Information Technology Act, 2000 and Data Protection 117
215 Data Protection Provisions pertaining to data protection and personal data protection 117
UNCLTRAL (United Nations Commission on International Trade Law)
214 Data Protection model law 117
S. Page
No. Topic Sub Topic No.
224 Data Protection law Consent manager 122
221 Data Protection law Data fiduciary 122
223 Data Protection law Data principal 122
222 Data Protection law Data processor 122
228 Data Protection law European Union (Proposed) AI Act, 2024 125
233 Data Protection law Evolution of Social Media and Other Intermediaries 129
225 Data Protection law Exemptions under the DPDP Act 123
230 Data Protection law Four (4) Point Summary of European Union Proposed AI 126
227 Data Protection law Global Data Protection Models – Cyber Crimes 125
231 Data Protection law Governance 128
Guidelines Related to Social Media to Be Administered by Ministry of
235 Data Protection law Electronics and IT 130
220 Data Protection law India’s Digital Personal Data Protection Act, 2023: Key Provisions 122
Information Technology (Intermediary Guidelines and Digital Media
232 Data Protection law Ethics Code) Rules 2021 128
219 Data Protection law Personal Data Protection Bill, 2019 - Key Highlights 121
234 Data Protection law Rationale and Justification for New Guidelines 130
Steps for companies prepare for compliance under the Digital Personal
226 Data Protection law Data Protection Act 123
229 Data Protection law Summary of European Union proposed AI Act 126
733 DBM Access and Manipulation of Database Files 334
690 DBM Advantages of Database 328
721 DBM Advantages of DBMS 332
697 DBM Arrays 329
687 DBM Authentication 327
688 DBM Authorization 327
718 DBM Backup and Recovery 331
736 DBM Characteristics of data mining 335
738 DBM Characteristics of data warehousing 335
675 DBM Conceptual Level 326
717 DBM Concurrency Control 331
684 DBM Constraints 327
682 DBM Data Definition Language (DDL) 327
710 DBM Data Definition Language (DDL) 331
713 DBM Data Dictionary 331
683 DBM Data Integrity 327
716 DBM Data Integrity 331
711 DBM Data Manipulation Language (DML) 331
735 DBM Data Mining 334
S. Page
No. Topic Sub Topic No.
734 DBM Data Mining and Warehousing 334
677 DBM Data Models 327
686 DBM Data Security 327
715 DBM Data Security 331
692 DBM Data Structure 328
737 DBM Data Warehousing 335
673 DBM Database Abstraction 326
671 DBM Database Concepts 326
723 DBM Database Files 333
707 DBM Database Management System 331
681 DBM Database Management System (DBMS) 327
708 DBM DBMS Architecture 331
709 DBM DBMS Components 331
714 DBM DBMS Features 331
720 DBM DBMS Users 332
739 DBM Differences between Data Mining and Data Warehousing 336
691 DBM Disadvantages of Database 328
722 DBM Disadvantages of DBMS 333
689 DBM Encryption 327
703 DBM Graphs 330
732 DBM Hashed Files 334
704 DBM Heaps 330
726 DBM Hierarchal Files 333
678 DBM Hierarchical Model 327
706 DBM Implementation of Data Structures 330
731 DBM Indexed Files 334
705 DBM Key Features of Data Structures 330
696 DBM Linear Data Structures 329
698 DBM Linked Lists 329
727 DBM Network Files 334
679 DBM Network Model 327
701 DBM Non-Linear Data Structures 330
695 DBM Non-Primitive Data Structures 329
728 DBM Object-Oriental Files 334
729 DBM Organization of Database Files 334
674 DBM Physical Level (Internal Level) 326
694 DBM Primitive Data Structures 329
672 DBM Purpose of Database 326
712 DBM Query Language 331
S. Page
No. Topic Sub Topic No.
700 DBM Queues 330
725 DBM Relational Data 333
680 DBM Relational Model 327
685 DBM Rules 327
719 DBM Scalability 332
730 DBM Sequential Files 334
699 DBM Stacks 330
702 DBM Tress 330
693 DBM Types of Data Structures 329
724 DBM Types of Database Files 333
740 DBM Uses of Data Mining and Data Warehousing 336
676 DBM View Level (External Level) 326
286 Digital Forensics Branches in Digital Forensics 159
288 Digital Forensics Digital Forensics - Chain of Custody 161
284 Digital Forensics Digital Forensics/ Digital Evidences 158
292 Digital Forensics Documentation/Authentication of Chain of Custody 162
291 Digital Forensics Procedure to establish the Chain of Custody 162
290 Digital Forensics Process of Chain of Custody 161
289 Digital Forensics Significance of maintaining Chain of Custody 161
285 Digital Forensics Steps in Digital Forensics 159
287 Digital Forensics Steps in Preserving Digital Evidence 160
372 Digital India API Setu 192
355 Digital India Common Services Centres 191
360 Digital India CO-WIN 191
358 Digital India DigiLocker 191
350 Digital India Digital Empowerment 190
349 Digital India Digital India- Meaning and Concepts 189
348 Digital India Digital India Program 188
351 Digital India Digital Infrastructure 190
365 Digital India Diksha 192
364 Digital India Direct Benefit Transfers 192
357 Digital India e-District Mission Mode Project (MMP) 191
352 Digital India E-Governance & e-Services 190
E-Governance/Digital India: Snap Shot of Recent Government
354 Digital India Initiatives 191
353 Digital India Initiatives under Digital India 190
373 Digital India MeitY 192
362 Digital India MeriPehchaan 191
367 Digital India M-KISAN 192
S. Page
No. Topic Sub Topic No.

370 Digital India Mobile based advisory system for agriculture & Horticulture (M4AGRI) 192
361 Digital India MyGov 191
363 Digital India MyScheme 191
366 Digital India National Agriculture Market (e-NAM) 192
368 Digital India One Stop Window 192
371 Digital India Open Government Data 192
369 Digital India Soil Health Card 192
356 Digital India Unified Mobile Application for New-age Governance (UMANG) 191
359 Digital India Unified Payment Interface (UPI) 191
195 Digital India Act Challenges Ahead in the Implementation of DIA, 2023 107
Major reasons which necessitates the introduction of proposed Digital
192 Digital India Act India Act 106
190 Digital India Act Necessity for Digital India Act (DIA) 105
191 Digital India Act Need for Digital India Act 105
189 Digital India Act Nine Pillars of Digital India 105
Requirement of Industry Alignment towards Goals and Proposed
194 Digital India Act Structure of DIA 107
193 Digital India Act Salient Features of Proposed Digital India Act 107
196 Digital India Act Way Forward for Effective Implementation of DIA, 2023 108
344 E-Governance Aadhar Enabled Payment System 188
347 E-Governance Digital Cloud for every Indian 188
343 E-Governance Direct Cash Transfer 188
311 E-Governance E-Governance in India 182
346 E-Governance E-Kranti Scheme 188
313 E-Governance Evolution of E-Governance 182
319 E-Governance Government to Businesses (G2B) - E-Governance 184
318 E-Governance Government to Citizen (G2C) - E-Governance 184
320 E-Governance Government to Employees (G2E) - E-Governance 184
317 E-Governance Government to Government (G2G) - E-Governance 184
312 E-Governance Meaning of E-Governance 182
345 E-Governance MyGov Citizen Portal 188
321 E-Governance National E-governance Plan - E-Governance 184
314 E-Governance Objectives of E-Governance 183
315 E-Governance Pillars of E-Governance 183
342 E-Governance Recent Initiatives - E-Governance 187
316 E-Governance Types of Interaction in E-Governance 183
917 ERP AI-Powered Insights and Improvements 424
900 ERP Before ERP and After ERP 413
S. Page
No. Topic Sub Topic No.
901 ERP Benefits of Enterprise Resource Planning 415
912 ERP Cloud ERP 422
914 ERP Digital Transformation 423
903 ERP ERP Related Technologies 418
899 ERP How ERP Works 413
896 ERP Introduction - Enterprise Resource Management 412
902 ERP Limitations of Enterprise Resource Planning 417
919 ERP Mobile ERP 424
915 ERP Other Technology Integrated With ERP 423
916 ERP Personalization 423
905 ERP Planning Evaluation and Selection of ERP Systems 420
918 ERP Predictive Analytics 424
911 ERP Recent Trends in ERP: 2023 422
898 ERP Significance of ERP 413
906 ERP Stage 1 - Plan Requirement - ERP Systems 422
907 ERP Stage 2 - Request For Proposals (RFP) - ERP Systems 422
908 ERP Stage 3 - Solution Evaluation - ERP Systems 422
909 ERP Stage 4 - Contract Negotiation - ERP Systems 422
910 ERP Stage 5 - Selection and Agreement - ERP Systems 422
913 ERP Two-tier ERP 423
904 ERP Type of ERP System Modules 418
897 ERP Understanding Enterprise Resource Planning (ERP) 413
309 Hacking Hacking 174
310 Hacking Short list of great hackers of the world 174
851 Info. Sys. Advantages & Disadvantages of Executive Information System 382
873 Info. Sys. Application of Information Systems in Business 390
875 Info. Sys. Areas of implementation of Information Systems 391
854 Info. Sys. Attributes of DSS 383
871 Info. Sys. Benefits of an Office Automation System 389
844 Info. Sys. Changeover plans for Information System 377
855 Info. Sys. Characteristics of DSS 383
850 Info. Sys. Characteristics of Executive Information System 381
848 Info. Sys. Common Benefits of Information system 380
856 Info. Sys. Components of DSS 383
841 Info. Sys. Components of Information System 376
866 Info. Sys. Components of Transaction Processing System 387
852 Info. Sys. Decision Support system (DSS) 382
842 Info. Sys. Elements of complete Information System implementation 377
869 Info. Sys. Examples of Transaction Processing System 388
S. Page
No. Topic Sub Topic No.
849 Info. Sys. Executive Information System 381
868 Info. Sys. Functions of Transaction Processing System 388
845 Info. Sys. How Information System is Useful for Business 378
843 Info. Sys. Implementation Plans of Information System 377
840 Info. Sys. Information System 376
874 Info. Sys. Information System in Daily life 390
876 Info. Sys. Information Systems and Security 392
872 Info. Sys. Key features of an Office Automation System 389
867 Info. Sys. Limitations of Transaction Processing Systems 387
858 Info. Sys. Management Information System (MIS) 384
862 Info. Sys. Management Information System and Its Application 386
870 Info. Sys. Office Automation System 388
861 Info. Sys. Pros & Cons of MIS 385
860 Info. Sys. Role of MIS in various deptartments 385
863 Info. Sys. Transaction Processing System 386
865 Info. Sys. Transaction Processing System Features 387
846 Info. Sys. Transformation of Business through Information System 379
853 Info. Sys. Types of decision in DSS 382
857 Info. Sys. Types of DSS 384
847 Info. Sys. Types of Information System 380
859 Info. Sys. Types of MIS 384
864 Info. Sys. Types of Transaction Processing System 386
960 Internet Advantages and Disadvantages - Digital Currencies 446
978 Internet AI, chatbots and shopping assistants 452
921 Internet Application of Internet: Major Types 428
920 Internet Applications of Internet 428
975 Internet Augmented Reality (AR) 451
946 Internet Benefits and Limitations of E-Commerce 436
962 Internet Block Chain Technology 447
980 Internet Bluetooth and Wi-Fi 452
951 Internet Categories of CRM 442
950 Internet Customer Relationship Management (CRM) 442
945 Internet Development of E-commerce 434
981 Internet Difference between Bluetooth and Wi-Fi 452
958 Internet Digital Currency 445
944 Internet E-Commerce 434
966 Internet E-Commerce Security – Mobile Commerce 449
953 Internet EDI Documents 443
954 Internet EDI Users 444
S. Page
No. Topic Sub Topic No.
952 Internet Electronic Data Interchange (EDI) 443
955 Internet Electronic Fund Transfers (EFT) 444
956 Internet Electronic Funds Transfer (EFT): How it works 444
922 Internet Example of Application of Internet 429
967 Internet Examples of M-commerce use in specific industries 449
965 Internet Examples of Payment Gateways 449
931 Internet FTP (File Transfer Protocol) 431
974 Internet Future of Mobile Commerce 451
943 Internet Gopher. 434
933 Internet HTTP (Hyper Text Transfer Protocol) 432
934 Internet HTTPS (Hyper Text Transfer Protocol Secure) 432
939 Internet ICMP 433
941 Internet IMAP 433
923 Internet Internet Protocols 430
926 Internet IP Address 430
937 Internet IPv4 432
938 Internet IPv6 432
957 Internet Major Features of Electronic Funds Transfer (EFT) 445
973 Internet M-commerce vs. E-commerce 450
977 Internet Mobile banking 451
970 Internet Mobile banking 450
971 Internet Mobile payments 450
976 Internet Mobile SEO 451
969 Internet Mobile shopping 450
979 Internet Mobile ticketing 452
925 Internet Need of Protocols 430
949 Internet Parts of Supply Chain Management 440
964 Internet Payment Portal - Digital Currencies 448
936 Internet POP3 (Post Office Protocol 3) 432
930 Internet PPP (Point-to-Point Protocol) 431
961 Internet Pros & Cons of Digital Currencies 447
932 Internet SFTP (Secure File Transfer Protocol) 431
929 Internet SMTP (Simple Mail Transfer Protocol) 431
942 Internet SSH 433
948 Internet Supply Chain Management 440
928 Internet TCP/IP (Transmission Control Protocol/ Internet Protocol) 431
935 Internet TELNET (Terminal Network) 432
963 Internet Transaction Process - Block Chain Technology 447
959 Internet Types of Digital Currencies 445
S. Page
No. Topic Sub Topic No.
947 Internet Types of E-Commerce (B2B, B2C, C2C and C2B) 439
927 Internet Types of Internet Protocol 430
968 Internet Types of M-commerce 450
940 Internet UDP 433
924 Internet Working of Internet Protocol 430
972 Internet Working of Mobile Commerce 450
198 IPC Indian Penal Code, 1860 – Cyber threats and Cyber Law 109
Draft Information Technology [Intermediaries Guidelines (Amendment)
177 IT Act Rules], 2018, (“Draft Rules”) (2018) 100
218 IT Act Information Technology (Amendment) Act, 2008 119
Information Technology (Intermediary Guidelines and Digital Media
180 IT Act Ethics Code) Rules, 2021 101
169 IT Act Information Technology Act, 2000 (IT Act) 98
182 IT Act Information Technology Act, 2000 (IT Act, 2000) 102
187 IT Act Information Technology Rules (IT Rules) 104
186 IT Act Positive and negative aspects of IT Act, 2000 103
Proposed Digital India Act: An Act in Progress to replace Information
188 IT Act Technology Act, 2000 105
170 IT Act Safe Harbour Protection 98
183 IT Act The important provisions of IT Act, 2000 102
The Information Technology (Intermediaries Guidelines) Rules, 2011
172 IT Act (“Intermediary Guidelines”) (2011) 99
454 Legal Analytics Data Incorporated into Legal Analytics 226
455 Legal Analytics Ways to use Legal Analytics 226
465 Machine Learning Bias - Machine Learning 235
463 Machine Learning Bias and Variance in Machine Learning 233
462 Machine Learning Bias/ Variance, Precision/Recall & Dimensionality 233
472 Machine Learning Bias-Variance Trade-Off 238
469 Machine Learning Different Combinations of Bias-Variance - Machine Learning 236
464 Machine Learning Errors in Machine Learning 234
475 Machine Learning How to avoid the Overfitting in Model 240
470 Machine Learning How to identify High variance or High Bias? 237
477 Machine Learning Logistic Regression in Machine Learning 241
478 Machine Learning Maximum Likelihood Estimation (MLE) 241
474 Machine Learning Overfitting - Machine Learning 239
473 Machine Learning Overfitting, Underfitting, & Cross-Validation 238
471 Machine Learning Trade Offs and Bias - Machine Learning 237
476 Machine Learning Underfitting - Machine Learning 240
467 Machine Learning Variance Error - Machine Learning 235
S. Page
No. Topic Sub Topic No.
466 Machine Learning Ways to reduce High Bias - Machine Learning 235
468 Machine Learning Ways to Reduce High Variance - Machine Learning 236
479 Machine Learning What is the likelihood? - Maximum Likelihood Estimation 242
480 Machine Learning Working of Maximum Likelihood Estimation 242
881 MIS Advantages of Management Information System 399
889 MIS Applications of Management Information System 404
890 MIS Applications of Management Information System in Service Sectors 405
893 MIS Banking Information System 406
880 MIS Characteristics of Management Information System 398
883 MIS Components of Management Information System 400
882 MIS Disadvantages of Management Information System 399
878 MIS Evolution of the Concept of Management Information System 397
891 MIS Hospital Information System 405
892 MIS Hotel Information System 405
888 MIS Information systems that are part of management information system 403
877 MIS Introduction - Management Information Systems – An Overview 396
894 MIS Management Information System and Other Academic Disciplines 406
887 MIS Management Information System and Other Information Systems 403
895 MIS Management Information System and Security 407
884 MIS MIS and Its Functional Subsystems 401
879 MIS Objectives of Management Information System 397
886 MIS Role of Management Information System in Decision Making 402
Utilization of Management Information System in Indian Business
885 MIS Scenario 401
327 MMP Banking - MMP 185
322 MMP Central government initiatives as Mission Mode Projects (MMP) 185
341 MMP Common Services Centers - Integrated MMP 187
331 MMP Crime and Criminal Tracking Network & Systems - State MMP 186
340 MMP e-Biz - Integrated MMP 187
339 MMP e-Courts - Integrated MMP 187
335 MMP e-District - State MMP 186
330 MMP e-Governance in Municipalities - State MMP 186
323 MMP e-office - MMP 185
334 MMP e-panchayat - State MMP 186
338 MMP e-procurement - Integrated MMP 187
333 MMP Health - State MMP 186
Immigration, Visa and Foreigner’s Registration & Tracking (IVFRT) -
324 MMP MMP 185
337 MMP Integrated Mission Mode Projects - E-Governance 187
S. Page
No. Topic Sub Topic No.

336 MMP National Land Records Modernization Programme (NLRMP) - State MMP 186
326 MMP Pensions - MMP 185
328 MMP Posts - MMP 186
332 MMP Public Distribution System - State MMP 186
329 MMP State Mission Mode Projects - E-Governance 186
325 MMP Unique Identification Number (UID) - MMP 185
603 Network Security Active Attack 290
595 Network Security Application Layer 285
610 Network Security Authentication Applications 292
606 Network Security Bridges 291
601 Network Security Common Network Attacks 289
588 Network Security Extranets 283
611 Network Security Firewall 293
589 Network Security Internet 283
597 Network Security Internet Layer 286
594 Network Security Internet Protocol Suite 285
587 Network Security Intranets 283
584 Network Security Introduction - Network Basics And Security 282
592 Network Security Layers of OSI model 284
598 Network Security Network Access/Interface Layer 286
605 Network Security Network Devices Hubs 290
585 Network Security Network Security 282
590 Network Security Networking Concepts 284
586 Network Security Objectives of Network Security 283
591 Network Security Open System Interconnection (OSI) Model 284
602 Network Security Passive Attack 289
599 Network Security Ports 287
600 Network Security Secure Protocols 288
608 Network Security Security Devices 292
607 Network Security Switch 291
593 Network Security TCP/IP Model (The Internet Protocol Suite) 285
596 Network Security Transport Layer 286
604 Network Security Types of Active Attack 290
612 Network Security Types of Firewall 294
609 Network Security Types of Network Security Devices 292
458 QLP Applications of Quantitative Legal Prediction 229
459 QLP Limitations of Quantitative Legal Prediction 231
457 QLP Overview of Quantitative Legal Prediction (QLP) 228
S. Page
No. Topic Sub Topic No.
456 QLP Quantitative Legal Prediction Vis-À-Vis Business of Law 228
461 QLP Using QLP for Profiling Judges and its Rule of Law Implications 233
460 QLP Using QLP to Predict Court Case Outcomes 232
295 Security Audit Advantages of Security Audit 164
299 Security Audit Cyber Security Audit Checklist 169
298 Security Audit Cyber Security Audit: A Snapshot 168
293 Security Audit Security Audit - Computer Forensics 163
294 Security Audit Significance of Security Audit 164
297 Security Audit Steps – On Conducting Security Audit 165
296 Security Audit Types of Security Audit 164
656 Software Advantages of IAAS 313
660 Software Advantages of PAAS 315
666 Software Advantages of SAAS 318
627 Software Application Software - Software Classification 302
626 Software BIOS 302
640 Software Case Study and Case Laws of Indian Law on Software Security 307
615 Software Characteristics of Good Software 299
665 Software Characteristics of SAAS 317
633 Software Closed Source Software 303
623 Software Components of Language Processor 301
625 Software Device Driver 302
624 Software Difference between Compiler and Interpreter 301
661 Software Disadvantages of PAAS 315
630 Software Freeware 302
620 Software Functions of an Operating System 300
667 Software Future of SAAS 318
658 Software IAAS : Storage 314
654 Software IAAS Platform and Architecture 312
655 Software IAAS Pricing 313
653 Software IAAS Services 312
613 Software Introduction - Softwares And Software Security 298
621 Software Language Processor 301
670 Software Legal and Compliance Requirements of Software Security 319
668 Software On Premise Software 319
632 Software Open Source Software 303
619 Software Operating System 300
629 Software Other Types of Software on The Basis of Availability and Shareability 302
659 Software PAAS 314
669 Software Pros and Cons of On-Premise Software 319
S. Page
No. Topic Sub Topic No.
663 Software Purpose-Built PAAS Types 316
664 Software SAAS Services 317
SAAS; PAAS, IAAS and On-Premise Software: Overview and Recent
652 Software Trends 312
631 Software Sharewares 303
616 Software Software Classification 299
634 Software Software Security 303
637 Software Software Security Goals 305
636 Software Software Security: A Proactive Security 304
638 Software Software Security: Best Practices 305
635 Software Software Security: Overview and Significance 303
614 Software Software-Overview 298
617 Software Systems Software 300
622 Software Types of Language processor 301
618 Software Types of system software 300
657 Software Typical use case IAAS 314
662 Software Use Cases for PAAS 315
628 Software Utility Software 302
639 Software What to Avoid in Software Security? 306
649 Software Security Analysis of Indian law on software security 310
651 Software Security The Indian Penal Code (IPC 1980) 311
650 Software Security The Information Technology Act (IT Act 2000) 310

You might also like