Wayne Patterson (Patterson Wayne Patterson and Associates), Cynthia E. Winston-Proctor (USA Howard University)
Behavioral Cybersecurity
Applications of Personality Psychology and Computer Science
Wayne Patterson (Patterson Wayne Patterson and Associates), Cynthia E. Winston-Proctor (USA Howard University)
Behavioral Cybersecurity
Applications of Personality Psychology and Computer Science
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Cybersecurity has had far too little study and research. Research that has taken place, was done by those with computer science, electrical engineering, and mathematics backgrounds. This book incorporates traditional technical computational and analytic approaches to cybersecurity, and also psychological and human factors approaches.
Andere Kunden interessierten sich auch für
- Wayne Patterson (Private Consultant for Howard University)Behavioral Cybersecurity33,99 €
- Cybercrime Through an Interdisciplinary Lens68,99 €
- S.C. CoutinhoThe Mathematics of Ciphers86,99 €
- Alasdair McAndrewIntroduction to Cryptography with Open-Source Software90,99 €
- Alasdair McAndrewIntroduction to Cryptography with Open-Source Software48,99 €
- Jacqueline JeynesRisk Management55,99 €
- Eric ShawThe Psychology of Insider Risk46,99 €
-
-
-
Cybersecurity has had far too little study and research. Research that has taken place, was done by those with computer science, electrical engineering, and mathematics backgrounds. This book incorporates traditional technical computational and analytic approaches to cybersecurity, and also psychological and human factors approaches.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 290
- Erscheinungstermin: 14. Oktober 2024
- Englisch
- Abmessung: 156mm x 233mm x 20mm
- Gewicht: 440g
- ISBN-13: 9781032924663
- ISBN-10: 1032924667
- Artikelnr.: 71691967
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 290
- Erscheinungstermin: 14. Oktober 2024
- Englisch
- Abmessung: 156mm x 233mm x 20mm
- Gewicht: 440g
- ISBN-13: 9781032924663
- ISBN-10: 1032924667
- Artikelnr.: 71691967
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Wayne Patterson is Professor of Computer Science at Howard University in Washington, DC. He was born in Moncton, Canada and received his bachelors and Masters in Honours Mathematics from the University of Toronto and his PhD in Mathematics from the University of Michigan. After a number of years away from the Academy, including a term as a member of the staff of Canadian Prime Minister Pierre Trudeau, he returned to teaching, serving as the founder of the Computer Science Department at the Université de Moncton, later as Associate Vice Chancellor for Research at the University of New Orleans, Vice President of the University of Charleston in South Carolina, and Howard for the past 17 years. His primary research area has been Cybersecurity, with a leading textbook in that field, approximately 60 scientific publications, and external research grants totaling more than $15 million. Dr. Winston-Proctor is a narrative personality psychologist. She is also Professor of Psychology at Howard University, Principal of Winston Synergy, L.L.C., and Co-Principal Investigator of the NSF HU ADVANCE-Institutional Transformation Initative. Her academic and practice work focus on the psychology of success of women within academic and corporate environments. Dr. Winston-Proctor also translates research to develop culturally relevant psychological science, research design & analysis, computational thinking, and behavioral cybersecurity education models for middle school, high school, and undergraduate learning environments. She is on the Editorial Board of the American Psychological Association journal, Qualitative Psychology, President of the Society of STEM Women of Color, and Vice Chair of the Board of Howard University Middle School of Mathematics and Science. She received the NSF CAREER Award for her early career work on the psychology of success and the meaning of race within the lives of African American scientists and engineers. This award is among the most prestigious awards for early career U.S. scientists and engineers. Dr. Winston-Proctor earned a Ph.D. from the University of Michigan and a B.S. from Howard University (Phi Beta Kappa). Previously, she served as Director of Educational Programs at the Congressional Black Caucus Foundation and as a Howard Hughes Medical Institute Research Professor at Brown University.
Chapter 1. What is Cybersecurity? Chapter 2. Essentials of Behavioral
Science. Chapter 3. Psychology and Cybersecurity. Chapter 4. Recent Events.
Chapter 5. Profiling. Chapter 6. Hack Lab 1: Social Engineering Practice:
Who Am I? Chapter 7. Access Control. Chapter 8. The First
Step:Authorization. Chapter 9. Hack Lab 2: Assigned Passwords in the Clear.
Chapter 10. Origins of Cryptography. Chapter 11. Hack Lab 3: Sweeny Method.
Chapter 12. Hacker Personalities: Case Studies. Chapter 13. Game Theory.
Chapter 14. Ethical Hacking. Chapter 15. The Psychology of Gender. Chapter
16. Turing Tests. Chapter 17. Personality Tests, Methods, and Assessments.
Chapter 18. Modular Arithmetic and Other Computational Methods. Chapter 19.
Modern Cryptography. Chapter 20. Steganography. Chapter 21. Using
Cryptography and Steganography in Tandem or in Sequence.Chapter 22. A
Metric to Assess Cyberattacks. Chapter 23. Behavioral Economics. Chapter
24. Fake News. Chapter 25. Potpourri. Chapter 26. Hack Lab 4:
Contradictions in Password Meters. Chapter 27. Conclusion.
Science. Chapter 3. Psychology and Cybersecurity. Chapter 4. Recent Events.
Chapter 5. Profiling. Chapter 6. Hack Lab 1: Social Engineering Practice:
Who Am I? Chapter 7. Access Control. Chapter 8. The First
Step:Authorization. Chapter 9. Hack Lab 2: Assigned Passwords in the Clear.
Chapter 10. Origins of Cryptography. Chapter 11. Hack Lab 3: Sweeny Method.
Chapter 12. Hacker Personalities: Case Studies. Chapter 13. Game Theory.
Chapter 14. Ethical Hacking. Chapter 15. The Psychology of Gender. Chapter
16. Turing Tests. Chapter 17. Personality Tests, Methods, and Assessments.
Chapter 18. Modular Arithmetic and Other Computational Methods. Chapter 19.
Modern Cryptography. Chapter 20. Steganography. Chapter 21. Using
Cryptography and Steganography in Tandem or in Sequence.Chapter 22. A
Metric to Assess Cyberattacks. Chapter 23. Behavioral Economics. Chapter
24. Fake News. Chapter 25. Potpourri. Chapter 26. Hack Lab 4:
Contradictions in Password Meters. Chapter 27. Conclusion.
Chapter 1. What is Cybersecurity? Chapter 2. Essentials of Behavioral
Science. Chapter 3. Psychology and Cybersecurity. Chapter 4. Recent Events.
Chapter 5. Profiling. Chapter 6. Hack Lab 1: Social Engineering Practice:
Who Am I? Chapter 7. Access Control. Chapter 8. The First
Step:Authorization. Chapter 9. Hack Lab 2: Assigned Passwords in the Clear.
Chapter 10. Origins of Cryptography. Chapter 11. Hack Lab 3: Sweeny Method.
Chapter 12. Hacker Personalities: Case Studies. Chapter 13. Game Theory.
Chapter 14. Ethical Hacking. Chapter 15. The Psychology of Gender. Chapter
16. Turing Tests. Chapter 17. Personality Tests, Methods, and Assessments.
Chapter 18. Modular Arithmetic and Other Computational Methods. Chapter 19.
Modern Cryptography. Chapter 20. Steganography. Chapter 21. Using
Cryptography and Steganography in Tandem or in Sequence.Chapter 22. A
Metric to Assess Cyberattacks. Chapter 23. Behavioral Economics. Chapter
24. Fake News. Chapter 25. Potpourri. Chapter 26. Hack Lab 4:
Contradictions in Password Meters. Chapter 27. Conclusion.
Science. Chapter 3. Psychology and Cybersecurity. Chapter 4. Recent Events.
Chapter 5. Profiling. Chapter 6. Hack Lab 1: Social Engineering Practice:
Who Am I? Chapter 7. Access Control. Chapter 8. The First
Step:Authorization. Chapter 9. Hack Lab 2: Assigned Passwords in the Clear.
Chapter 10. Origins of Cryptography. Chapter 11. Hack Lab 3: Sweeny Method.
Chapter 12. Hacker Personalities: Case Studies. Chapter 13. Game Theory.
Chapter 14. Ethical Hacking. Chapter 15. The Psychology of Gender. Chapter
16. Turing Tests. Chapter 17. Personality Tests, Methods, and Assessments.
Chapter 18. Modular Arithmetic and Other Computational Methods. Chapter 19.
Modern Cryptography. Chapter 20. Steganography. Chapter 21. Using
Cryptography and Steganography in Tandem or in Sequence.Chapter 22. A
Metric to Assess Cyberattacks. Chapter 23. Behavioral Economics. Chapter
24. Fake News. Chapter 25. Potpourri. Chapter 26. Hack Lab 4:
Contradictions in Password Meters. Chapter 27. Conclusion.