語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security, privacy and user interaction
~
Jakobsson, Markus.
FindBook
Google Book
Amazon
博客來
Security, privacy and user interaction
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Security, privacy and user interaction/ edited by Markus Jakobsson.
其他作者:
Jakobsson, Markus.
出版者:
Cham :Springer International Publishing : : 2020.,
面頁冊數:
xv, 153 p. :ill., digital ;24 cm.
內容註:
PART I: Considering the Typical User -- 1. Mind your SMSes: Mitigating Social Engineering in Second Factor Authentication -- 2. Permissions and Privacy -- 3. Privacy and Tracking -- PART II: Considering the Malicious User -- 4. A Framework for Analysis Attackers' Accounts -- 5. Environmentally and Politically Conscious Crypto -- Part III: Designing Solutions Based on Typical and Malicious Users -- 6. Social Engineering Resistant 2FA -- 7. The Rising Threat of Launchpad Attacks -- 8. Discouraging Counterfeiting -- 9. Seeing the Future.
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-030-43754-1
ISBN:
9783030437541
Security, privacy and user interaction
Security, privacy and user interaction
[electronic resource] /edited by Markus Jakobsson. - Cham :Springer International Publishing :2020. - xv, 153 p. :ill., digital ;24 cm.
PART I: Considering the Typical User -- 1. Mind your SMSes: Mitigating Social Engineering in Second Factor Authentication -- 2. Permissions and Privacy -- 3. Privacy and Tracking -- PART II: Considering the Malicious User -- 4. A Framework for Analysis Attackers' Accounts -- 5. Environmentally and Politically Conscious Crypto -- Part III: Designing Solutions Based on Typical and Malicious Users -- 6. Social Engineering Resistant 2FA -- 7. The Rising Threat of Launchpad Attacks -- 8. Discouraging Counterfeiting -- 9. Seeing the Future.
This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users - including malicious users, aiming to corrupt the system - this book Illustrates how better security technologies are made possible. Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse. Advanced-level students interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.
ISBN: 9783030437541
Standard No.: 10.1007/978-3-030-43754-1doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Security, privacy and user interaction
LDR
:02705nmm a2200325 a 4500
001
2256383
003
DE-He213
005
20201027202159.0
006
m d
007
cr nn 008maaau
008
220420s2020 sz s 0 eng d
020
$a
9783030437541
$q
(electronic bk.)
020
$a
9783030437534
$q
(paper)
024
7
$a
10.1007/978-3-030-43754-1
$2
doi
035
$a
978-3-030-43754-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
URD
$2
bicssc
072
7
$a
COM060040
$2
bisacsh
072
7
$a
URD
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
S446 2020
245
0 0
$a
Security, privacy and user interaction
$h
[electronic resource] /
$c
edited by Markus Jakobsson.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xv, 153 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
PART I: Considering the Typical User -- 1. Mind your SMSes: Mitigating Social Engineering in Second Factor Authentication -- 2. Permissions and Privacy -- 3. Privacy and Tracking -- PART II: Considering the Malicious User -- 4. A Framework for Analysis Attackers' Accounts -- 5. Environmentally and Politically Conscious Crypto -- Part III: Designing Solutions Based on Typical and Malicious Users -- 6. Social Engineering Resistant 2FA -- 7. The Rising Threat of Launchpad Attacks -- 8. Discouraging Counterfeiting -- 9. Seeing the Future.
520
$a
This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users - including malicious users, aiming to corrupt the system - this book Illustrates how better security technologies are made possible. Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse. Advanced-level students interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.
650
0
$a
Computer security.
$3
540555
650
0
$a
User interfaces (Computer systems)
$3
539550
650
0
$a
Computer crimes.
$3
583792
650
1 4
$a
Privacy.
$3
528582
650
2 4
$a
User Interfaces and Human Computer Interaction.
$3
892554
700
1
$a
Jakobsson, Markus.
$3
844713
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-030-43754-1
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9412018
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入