Mobile authentication : problems and solutions / / Markus Jakobsson
| Mobile authentication : problems and solutions / / Markus Jakobsson |
| Autore | Jakobsson Markus |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | New York, : Springer, 2012, c2013 |
| Descrizione fisica | 1 online resource (120 p.) |
| Disciplina | 005.8019 |
| Collana | SpringerBriefs in computer science |
| Soggetto topico |
Cell phone systems - Security measures
Mobile communication systems - Access control |
| ISBN |
1-283-62465-6
9786613937100 1-4614-4878-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | The Big Picture -- The Benefits of Understanding Passwords -- Your Password is Your New PIN -- Like Passwords - But Faster, Easier and More Secure -- Improved Visual Preference Authentication -- How to Kill Spoofing -- Can Biometrics Replace Passwords? -- Legacy Servers: Teaching Old Dogs New Tricks. |
| Record Nr. | UNINA-9910437573703321 |
Jakobsson Markus
|
||
| New York, : Springer, 2012, c2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The psychology of information security : resolving conflicts between security compliance and human behaviour / / Leron Zinatullin
| The psychology of information security : resolving conflicts between security compliance and human behaviour / / Leron Zinatullin |
| Autore | Zinatullin Leron |
| Pubbl/distr/stampa | Ely : , : IT Governance Publishing, , [2016] |
| Descrizione fisica | 1 online resource (119 p.) |
| Disciplina | 005.8019 |
| Collana | Fundamentals |
| Soggetto topico | Computer security - Psychological aspects |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-84928-790-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title; Copyright; Foreword; Preface; About the Author; Acknowledgements; Contents; Chapter 1: Introduction to Information Security; Chapter 2: Risk Management; Chapter 3: The Complexity of Risk Management; Chapter 4: Stakeholders and Communication; Chapter 5: Information Security Governance; Chapter 6: Problems with Policies; Chapter 7: How Security Managers Make Decisions; Chapter 8: How Users Make Decisions; There is no clear reason to comply; The cost of compliance is too high; There is an inability to comply; Chapter 9: Security and Usability; Chapter 10: Security Culture
Chapter 11: The Psychology of ComplianceChapter 12: Conclusion - Changing the Approach to Security; Design; Culture; Supervision and sanctioning; Appendix: Analogies; Analogy 1: Cake and Security; Analogy 2: Poker and Security; Sources; ITG Resources |
| Record Nr. | UNINA-9910465933503321 |
Zinatullin Leron
|
||
| Ely : , : IT Governance Publishing, , [2016] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The psychology of information security : resolving conflicts between security compliance and human behaviour / / Leron Zinatullin
| The psychology of information security : resolving conflicts between security compliance and human behaviour / / Leron Zinatullin |
| Autore | Zinatullin Leron |
| Pubbl/distr/stampa | Ely : , : IT Governance Publishing, , [2016] |
| Descrizione fisica | 1 online resource (119 p.) |
| Disciplina | 005.8019 |
| Collana | Fundamentals |
| Soggetto topico | Computer security - Psychological aspects |
| ISBN | 1-84928-790-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title; Copyright; Foreword; Preface; About the Author; Acknowledgements; Contents; Chapter 1: Introduction to Information Security; Chapter 2: Risk Management; Chapter 3: The Complexity of Risk Management; Chapter 4: Stakeholders and Communication; Chapter 5: Information Security Governance; Chapter 6: Problems with Policies; Chapter 7: How Security Managers Make Decisions; Chapter 8: How Users Make Decisions; There is no clear reason to comply; The cost of compliance is too high; There is an inability to comply; Chapter 9: Security and Usability; Chapter 10: Security Culture
Chapter 11: The Psychology of ComplianceChapter 12: Conclusion - Changing the Approach to Security; Design; Culture; Supervision and sanctioning; Appendix: Analogies; Analogy 1: Cake and Security; Analogy 2: Poker and Security; Sources; ITG Resources |
| Record Nr. | UNINA-9910797901803321 |
Zinatullin Leron
|
||
| Ely : , : IT Governance Publishing, , [2016] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The psychology of information security : resolving conflicts between security compliance and human behaviour / / Leron Zinatullin
| The psychology of information security : resolving conflicts between security compliance and human behaviour / / Leron Zinatullin |
| Autore | Zinatullin Leron |
| Pubbl/distr/stampa | Ely : , : IT Governance Publishing, , [2016] |
| Descrizione fisica | 1 online resource (119 p.) |
| Disciplina | 005.8019 |
| Collana | Fundamentals |
| Soggetto topico | Computer security - Psychological aspects |
| ISBN | 1-84928-790-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title; Copyright; Foreword; Preface; About the Author; Acknowledgements; Contents; Chapter 1: Introduction to Information Security; Chapter 2: Risk Management; Chapter 3: The Complexity of Risk Management; Chapter 4: Stakeholders and Communication; Chapter 5: Information Security Governance; Chapter 6: Problems with Policies; Chapter 7: How Security Managers Make Decisions; Chapter 8: How Users Make Decisions; There is no clear reason to comply; The cost of compliance is too high; There is an inability to comply; Chapter 9: Security and Usability; Chapter 10: Security Culture
Chapter 11: The Psychology of ComplianceChapter 12: Conclusion - Changing the Approach to Security; Design; Culture; Supervision and sanctioning; Appendix: Analogies; Analogy 1: Cake and Security; Analogy 2: Poker and Security; Sources; ITG Resources |
| Record Nr. | UNINA-9910824812403321 |
Zinatullin Leron
|
||
| Ely : , : IT Governance Publishing, , [2016] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||