Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures. It covers a broad range of topics, including methods for human training; novel cyber-physical and process-control systems; social, economic, and behavioral aspects of cyberspace; issues concerning the cybersecurity index; security metrics for enterprises; and risk evaluation.…mehr
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures. It covers a broad range of topics, including methods for human training; novel cyber-physical and process-control systems; social, economic, and behavioral aspects of cyberspace; issues concerning the cybersecurity index; security metrics for enterprises; and risk evaluation. Based on the AHFE 2019 International Conference on Human Factors in Cybersecurity, held on July 24-28, 2019, in Washington D.C., USA, the book not only presents innovative cybersecurity technologies, but also discusses emerging threats, current gaps in the available systems, and future challenges that may be successfully overcome with the help of human factors research.
Attempting to Reduce Susceptibility to Fraudulent Computer Pop-Ups Using Malevolence Cue Identification Training.- Cyber Resilient Behavior: Integrating Human Behavioral Models and Resilience Engineering Capabilities into Cyber Security.- An International Extension of Sweeney’s Data Privacy Research.- The Human Factor in Managing the Security of Information.- Beyond Passwords: Enforcing Username Security as the First Line of Defense.- Social Engineering and the Value of Data: The Need of Specific Awareness Programs.- Human Centered Cyber Situation Awareness.- Over-the-Shoulder Attack Resistant Graphical Authentication Schemes Impact on Working Memory.- Comparative Evaluation of Security and Convenience Trade-Offs in Password Generation Aiding Systems.
Attempting to Reduce Susceptibility to Fraudulent Computer Pop-Ups Using Malevolence Cue Identification Training.- Cyber Resilient Behavior: Integrating Human Behavioral Models and Resilience Engineering Capabilities into Cyber Security.- An International Extension of Sweeney's Data Privacy Research.- The Human Factor in Managing the Security of Information.- Beyond Passwords: Enforcing Username Security as the First Line of Defense.- Social Engineering and the Value of Data: The Need of Specific Awareness Programs.- Human Centered Cyber Situation Awareness.- Over-the-Shoulder Attack Resistant Graphical Authentication Schemes Impact on Working Memory.- Comparative Evaluation of Security and Convenience Trade-Offs in Password Generation Aiding Systems.
Attempting to Reduce Susceptibility to Fraudulent Computer Pop-Ups Using Malevolence Cue Identification Training.- Cyber Resilient Behavior: Integrating Human Behavioral Models and Resilience Engineering Capabilities into Cyber Security.- An International Extension of Sweeney’s Data Privacy Research.- The Human Factor in Managing the Security of Information.- Beyond Passwords: Enforcing Username Security as the First Line of Defense.- Social Engineering and the Value of Data: The Need of Specific Awareness Programs.- Human Centered Cyber Situation Awareness.- Over-the-Shoulder Attack Resistant Graphical Authentication Schemes Impact on Working Memory.- Comparative Evaluation of Security and Convenience Trade-Offs in Password Generation Aiding Systems.
Attempting to Reduce Susceptibility to Fraudulent Computer Pop-Ups Using Malevolence Cue Identification Training.- Cyber Resilient Behavior: Integrating Human Behavioral Models and Resilience Engineering Capabilities into Cyber Security.- An International Extension of Sweeney's Data Privacy Research.- The Human Factor in Managing the Security of Information.- Beyond Passwords: Enforcing Username Security as the First Line of Defense.- Social Engineering and the Value of Data: The Need of Specific Awareness Programs.- Human Centered Cyber Situation Awareness.- Over-the-Shoulder Attack Resistant Graphical Authentication Schemes Impact on Working Memory.- Comparative Evaluation of Security and Convenience Trade-Offs in Password Generation Aiding Systems.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497