Security and Usability: Designing Secure Systems that People Can Use
There is increasing agreement that we need to design secure computer systems that people can actually use, but less agreement about how to reach this goal. Destined to be the classic reference in this emerging field, Security & Usability collects 34 groundbreaking essays from leading security an...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Sebastopol
O'Reilly Media, Inc.
2008
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/0596008279/?ar |
Zusammenfassung: | There is increasing agreement that we need to design secure computer systems that people can actually use, but less agreement about how to reach this goal. Destined to be the classic reference in this emerging field, Security & Usability collects 34 groundbreaking essays from leading security and human-computer interaction (HCI) researchers on authentication, privacy and anonymity, secure systems, commercialization, and much more. It is expected to start an avalanche of discussion, new ideas, and further advances in this important field. |
Beschreibung: | Print version record |
Umfang: | 1 Online-Ressource (744 Seiten) |
ISBN: | 9780596553852 0596553854 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047362014 | ||
003 | DE-627-1 | ||
005 | 20240228114549.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2008 xx |||||o 00| ||eng c | ||
020 | |a 9780596553852 |c electronic bk. |9 978-0-596-55385-2 | ||
020 | |a 0596553854 |c electronic bk. |9 0-596-55385-4 | ||
035 | |a (DE-627-1)047362014 | ||
035 | |a (DE-599)KEP047362014 | ||
035 | |a (ORHE)0596008279 | ||
035 | |a (DE-627-1)047362014 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Cranor, Lorrie Faith |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Security and Usability |b Designing Secure Systems that People Can Use |
264 | 1 | |a Sebastopol |b O'Reilly Media, Inc. |c 2008 | |
300 | |a 1 Online-Ressource (744 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
520 | |a There is increasing agreement that we need to design secure computer systems that people can actually use, but less agreement about how to reach this goal. Destined to be the classic reference in this emerging field, Security & Usability collects 34 groundbreaking essays from leading security and human-computer interaction (HCI) researchers on authentication, privacy and anonymity, secure systems, commercialization, and much more. It is expected to start an avalanche of discussion, new ideas, and further advances in this important field. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Data protection | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
700 | 1 | |a Garfinkel, Simson |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780596008277 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780596008277 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0596008279/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047362014 |
---|---|
_version_ | 1821494917275320320 |
adam_text | |
any_adam_object | |
author | Cranor, Lorrie Faith |
author2 | Garfinkel, Simson |
author2_role | ctb |
author2_variant | s g sg |
author_facet | Cranor, Lorrie Faith Garfinkel, Simson |
author_role | aut |
author_sort | Cranor, Lorrie Faith |
author_variant | l f c lf lfc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047362014 (DE-599)KEP047362014 (ORHE)0596008279 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02097cam a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-047362014</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114549.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2008 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780596553852</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-596-55385-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596553854</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-596-55385-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047362014</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047362014</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0596008279</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047362014</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cranor, Lorrie Faith</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and Usability</subfield><subfield code="b">Designing Secure Systems that People Can Use</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol</subfield><subfield code="b">O'Reilly Media, Inc.</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (744 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">There is increasing agreement that we need to design secure computer systems that people can actually use, but less agreement about how to reach this goal. Destined to be the classic reference in this emerging field, Security & Usability collects 34 groundbreaking essays from leading security and human-computer interaction (HCI) researchers on authentication, privacy and anonymity, secure systems, commercialization, and much more. It is expected to start an avalanche of discussion, new ideas, and further advances in this important field.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Garfinkel, Simson</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780596008277</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780596008277</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0596008279/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047362014 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:00Z |
institution | BVB |
isbn | 9780596553852 0596553854 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (744 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | O'Reilly Media, Inc. |
record_format | marc |
spelling | Cranor, Lorrie Faith VerfasserIn aut Security and Usability Designing Secure Systems that People Can Use Sebastopol O'Reilly Media, Inc. 2008 1 Online-Ressource (744 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Print version record There is increasing agreement that we need to design secure computer systems that people can actually use, but less agreement about how to reach this goal. Destined to be the classic reference in this emerging field, Security & Usability collects 34 groundbreaking essays from leading security and human-computer interaction (HCI) researchers on authentication, privacy and anonymity, secure systems, commercialization, and much more. It is expected to start an avalanche of discussion, new ideas, and further advances in this important field. Computer security Data protection Computer Security Sécurité informatique Protection de l'information (Informatique) Garfinkel, Simson MitwirkendeR ctb 9780596008277 Erscheint auch als Druck-Ausgabe 9780596008277 |
spellingShingle | Cranor, Lorrie Faith Security and Usability Designing Secure Systems that People Can Use Computer security Data protection Computer Security Sécurité informatique Protection de l'information (Informatique) |
title | Security and Usability Designing Secure Systems that People Can Use |
title_auth | Security and Usability Designing Secure Systems that People Can Use |
title_exact_search | Security and Usability Designing Secure Systems that People Can Use |
title_full | Security and Usability Designing Secure Systems that People Can Use |
title_fullStr | Security and Usability Designing Secure Systems that People Can Use |
title_full_unstemmed | Security and Usability Designing Secure Systems that People Can Use |
title_short | Security and Usability |
title_sort | security and usability designing secure systems that people can use |
title_sub | Designing Secure Systems that People Can Use |
topic | Computer security Data protection Computer Security Sécurité informatique Protection de l'information (Informatique) |
topic_facet | Computer security Data protection Computer Security Sécurité informatique Protection de l'information (Informatique) |
work_keys_str_mv | AT cranorlorriefaith securityandusabilitydesigningsecuresystemsthatpeoplecanuse AT garfinkelsimson securityandusabilitydesigningsecuresystemsthatpeoplecanuse |