New Perspectives in Behavioral Cybersecurity (eBook, ePUB)
Human Behavior and Decision-Making Models
Redaktion: Patterson, Wayne
81,95 €
81,95 €
inkl. MwSt.
Sofort per Download lieferbar
41 °P sammeln
81,95 €
Als Download kaufen
81,95 €
inkl. MwSt.
Sofort per Download lieferbar
41 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
81,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
41 °P sammeln
New Perspectives in Behavioral Cybersecurity (eBook, ePUB)
Human Behavior and Decision-Making Models
Redaktion: Patterson, Wayne
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
New Perspectives in Behavioral Cybersecurity offers direction for readers in areas related to human behavior and cybersecurity, by exploring some of the new ideas and approaches in this subject, specifically with new techniques in this field coming from a diverse range of scholars.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 10.6MB
Andere Kunden interessierten sich auch für
- New Perspectives in Behavioral Cybersecurity (eBook, PDF)81,95 €
- Susmita BandyopadhyayDecision Support System (eBook, ePUB)52,95 €
- T. Ananth KumarEvolutionary Intelligence for Healthcare Applications (eBook, ePUB)21,95 €
- Kuldeep Singh KaswanCYBORG (eBook, ePUB)52,95 €
- Smart Technologies for Improved Performance of Manufacturing Systems and Services (eBook, ePUB)52,95 €
- Interactive Sketch-based Interfaces and Modelling for Design (eBook, ePUB)109,95 €
- Polinpapilinho F. KatinaBlockchain-Enabled Resilience (eBook, ePUB)48,95 €
-
-
-
New Perspectives in Behavioral Cybersecurity offers direction for readers in areas related to human behavior and cybersecurity, by exploring some of the new ideas and approaches in this subject, specifically with new techniques in this field coming from a diverse range of scholars.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 196
- Erscheinungstermin: 27. September 2023
- Englisch
- ISBN-13: 9781000932904
- Artikelnr.: 68687433
- Verlag: Taylor & Francis
- Seitenzahl: 196
- Erscheinungstermin: 27. September 2023
- Englisch
- ISBN-13: 9781000932904
- Artikelnr.: 68687433
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Dr. Wayne Patterson is a retired Professor of Computer Science at Howard University. He is also currently Co-Principal Investigator for the GEAR UP project at Howard. He has also been Director of the Cybersecurity Research Center, Associate Vice Provost for Research, and Senior Fellow for Research and International Affairs in the Graduate School at Howard. He has also been Professeur d'Informatique at the Université de Moncton, Chair of the Department of Computer Science at the University of New Orleans, and in 1988 Associate Vice Chancellor for Research there. In 1993, he was appointed Vice President for Research and Professional and Community Services, and Dean of the Graduate School at the College of Charleston, South Carolina. In 1998, he was selected by the Council of Graduate Schools, the national organization of graduate deans and graduate schools, as the Dean in Residence at the national office in Washington, DC. His other service to the graduate community in the United States has included being elected to the Presidency of the Conference of Southern Graduate Schools, and also to the Board of Directors of the Council of Graduate Schools. Dr. Patterson has published more than 50 scholarly articles primarily related to cybersecurity, one of the earliest textbooks in cybersecurity, Mathematical Cryptology (Rowman and Littlefield, 1986), and recently the first book in this aspect of cybersecurity (with co-author Cynthia K. Winston), Behavioral Cybersecurity (CRC Press, 2018) . He has been the principal investigator on over 35 external grants valued at over $6,000,000. In August 2006, he was loaned by Howard University to the US National Science Foundation to serve as the Foundation's Program Manager for International Science and Engineering in Developing Countries, and in 2017 was Visiting Scholar at Google. He received degrees from the University of Toronto (BSc and MSc in Mathematics), University of New Brunswick (MSc in Computer Science), and the University of Michigan (PhD in Mathematics). He also held Post-Doctoral appointments at Princeton University and the University of California - Berkeley.
Section I. Cybersecurity Concerns in the Work Environment. 1. Management
and Security of Financial Data Through Integrated Software Solutions. 2. An
Efficient Scheme For Detecting And Mitigating Insider Threats. 3. (Figures
query) Phishing Through URLs: An Instance Based Learning Model Approach to
Detecting Phishing. Section II. Cybersecurity Threats to the Individual. 4.
Video Games in Digital Forensics. 5. Dances with the Illuminati: Hands-On
Social Engineering in Classroom Setting. 6. Studying Fake News
Proliferation by Detecting Coordinated Inauthentic Behavior. 7. Refining
the Sweeney Approach on Data Privacy. Section III. Cybersecurity Concerns
in the Home and Work Environment. 8. Cybersecurity Hygiene: Blending Home
and Work Computing. 9. Will a Cybersecurity Mindset shift build and sustain
a Cybersecurity Pipeline?. Section IV. Ethical Behavior. 10. Cybersecurity
Behavior and Behavioral Interventions. Section V. Differences in Languages
in Cyberattacks. 11. Using Language Differences to Detect Cyberattacks:
Ukrainian and Russian. Section VI. Applications of Behavioral Economics to
Cybersecurity. 12. Using Economic Prospect Theory To Quantify Side Channel
Attacks. 13. A Game-Theoretic Approach to Detecting Romance Scams. Section
VII. New Approaches for Future Research. 14. (Unfinished?) Human-Centered
Artificial intelligence: Threats and Opportunities for Cybersecurity.
and Security of Financial Data Through Integrated Software Solutions. 2. An
Efficient Scheme For Detecting And Mitigating Insider Threats. 3. (Figures
query) Phishing Through URLs: An Instance Based Learning Model Approach to
Detecting Phishing. Section II. Cybersecurity Threats to the Individual. 4.
Video Games in Digital Forensics. 5. Dances with the Illuminati: Hands-On
Social Engineering in Classroom Setting. 6. Studying Fake News
Proliferation by Detecting Coordinated Inauthentic Behavior. 7. Refining
the Sweeney Approach on Data Privacy. Section III. Cybersecurity Concerns
in the Home and Work Environment. 8. Cybersecurity Hygiene: Blending Home
and Work Computing. 9. Will a Cybersecurity Mindset shift build and sustain
a Cybersecurity Pipeline?. Section IV. Ethical Behavior. 10. Cybersecurity
Behavior and Behavioral Interventions. Section V. Differences in Languages
in Cyberattacks. 11. Using Language Differences to Detect Cyberattacks:
Ukrainian and Russian. Section VI. Applications of Behavioral Economics to
Cybersecurity. 12. Using Economic Prospect Theory To Quantify Side Channel
Attacks. 13. A Game-Theoretic Approach to Detecting Romance Scams. Section
VII. New Approaches for Future Research. 14. (Unfinished?) Human-Centered
Artificial intelligence: Threats and Opportunities for Cybersecurity.
Section I. Cybersecurity Concerns in the Work Environment. 1. Management
and Security of Financial Data Through Integrated Software Solutions. 2. An
Efficient Scheme For Detecting And Mitigating Insider Threats. 3. (Figures
query) Phishing Through URLs: An Instance Based Learning Model Approach to
Detecting Phishing. Section II. Cybersecurity Threats to the Individual. 4.
Video Games in Digital Forensics. 5. Dances with the Illuminati: Hands-On
Social Engineering in Classroom Setting. 6. Studying Fake News
Proliferation by Detecting Coordinated Inauthentic Behavior. 7. Refining
the Sweeney Approach on Data Privacy. Section III. Cybersecurity Concerns
in the Home and Work Environment. 8. Cybersecurity Hygiene: Blending Home
and Work Computing. 9. Will a Cybersecurity Mindset shift build and sustain
a Cybersecurity Pipeline?. Section IV. Ethical Behavior. 10. Cybersecurity
Behavior and Behavioral Interventions. Section V. Differences in Languages
in Cyberattacks. 11. Using Language Differences to Detect Cyberattacks:
Ukrainian and Russian. Section VI. Applications of Behavioral Economics to
Cybersecurity. 12. Using Economic Prospect Theory To Quantify Side Channel
Attacks. 13. A Game-Theoretic Approach to Detecting Romance Scams. Section
VII. New Approaches for Future Research. 14. (Unfinished?) Human-Centered
Artificial intelligence: Threats and Opportunities for Cybersecurity.
and Security of Financial Data Through Integrated Software Solutions. 2. An
Efficient Scheme For Detecting And Mitigating Insider Threats. 3. (Figures
query) Phishing Through URLs: An Instance Based Learning Model Approach to
Detecting Phishing. Section II. Cybersecurity Threats to the Individual. 4.
Video Games in Digital Forensics. 5. Dances with the Illuminati: Hands-On
Social Engineering in Classroom Setting. 6. Studying Fake News
Proliferation by Detecting Coordinated Inauthentic Behavior. 7. Refining
the Sweeney Approach on Data Privacy. Section III. Cybersecurity Concerns
in the Home and Work Environment. 8. Cybersecurity Hygiene: Blending Home
and Work Computing. 9. Will a Cybersecurity Mindset shift build and sustain
a Cybersecurity Pipeline?. Section IV. Ethical Behavior. 10. Cybersecurity
Behavior and Behavioral Interventions. Section V. Differences in Languages
in Cyberattacks. 11. Using Language Differences to Detect Cyberattacks:
Ukrainian and Russian. Section VI. Applications of Behavioral Economics to
Cybersecurity. 12. Using Economic Prospect Theory To Quantify Side Channel
Attacks. 13. A Game-Theoretic Approach to Detecting Romance Scams. Section
VII. New Approaches for Future Research. 14. (Unfinished?) Human-Centered
Artificial intelligence: Threats and Opportunities for Cybersecurity.