Human dimensions of cybersecurity / Terry Bossomaier, Steven D'Alessandro, and Roger Bradbury.
Material type: TextPublisher: Boca Raton, Florida : CRC Press, 2020Description: xxvii, 199 pages : illustrations ; 25 cmContent type:- text
- unmediated
- volume
- 9781138590403
- 23 005.8 B655h
- QA76.9.A25 B6395 2020
Item type | Current library | Shelving location | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | Main Library-Nabua | Circulation Section | CIR 005.8 B655h 2020 (Browse shelf(Opens below)) | 1-1 | Available | 026172 |
Browsing Main Library-Nabua shelves, Shelving location: Circulation Section Close shelf browser (Hides shelf browser)
CIR 005.8 B324c 2014. Computer security and penetration testing. | CIR 005.8 B469h 2019 Hardware security : a hands-on learning approach / | CIR 005.8 B641c 2017 Cognitive hack the new battleground in cybersecurity... the human mind/ | CIR 005.8 B655h 2020 Human dimensions of cybersecurity / | CIR 005.8 B791c 2018 Cybersecurity essentials/ | CIR 005.8 B832c 2021 Cryptography, information theory, and error-correction : a handbook for the 21st century / | CIR 005.8 B911c 1991 Computer viruses and data protection |
Includes bibliographical references and index.
Case studies -- Networks and norms -- Consumer choice -- Risk perspectives in cybersecurity -- Government policy and statecraft in cyber security -- Technical perspectives -- The future.
"The book identifies the technological features that give rise to security issues. It describes the structure of the Internet and how it is compromised by malware, and examines some of the more common security issues. It then looks at aspects of human persuasion and consumer choice, and how these affect cyber security. It argues that social networks and the related norms play a key role as does government policy, as each impact on individual behavior of computer use. The book identifies the most important human and social factors that affect cybersecurity. It illustrates each factor using case studies, and examines possible solutions from both technical and human acceptability viewpoints"-- Provided by publisher.
There are no comments on this title.