Behavioral cybersecurity : (Record no. 128685)

000 -LEADER
fixed length control field 03890cam a22005651i 4500
001 - CONTROL NUMBER
control field 9781003052029
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220509193034.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200903r20202019flua ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency OCoLC-P
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000258332
-- (ePub ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000258335
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000258257
-- (PDF ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000258254
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000258295
-- (Mobipocket ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000258297
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003052029
-- (ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1003052029
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9780367509798 (hbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 0367509792
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1201/9781003052029
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1222806311
Canceled/invalid control number (OCoLC)1201675705
-- (OCoLC)1222799725
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1222806311
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 083000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code JMAL
Source bicssc
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Patterson, Wayne,
Dates associated with a name 1945-
Relator term author.
245 10 - TITLE STATEMENT
Title Behavioral cybersecurity :
Remainder of title fundamental principles and applications of personality psychology /
Statement of responsibility, etc Wayne Patterson, Cynthia E. Winston-Proctor.
250 ## - EDITION STATEMENT
Edition statement 1st.
264 #1 -
-- Boca Raton :
-- CRC Press,
-- 2020.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource :
Other physical details illustrations (black and white)
336 ## -
-- text
-- rdacontent
336 ## -
-- still image
-- rdacontent
337 ## -
-- computer
-- rdamedia
338 ## -
-- online resource
-- rdacarrier
500 ## - GENERAL NOTE
General note Originally published: 2019.
500 ## - GENERAL NOTE
General note 1. Recent Events. 2. Behavioral Cybersecurity. 3. Personality Psychology Theory and Methods of Assessment. 4. Hacker Case Study Personality Analysis and Ethical Hacking. 5. Profiling. 6. Access Control. 7. The First Step: Authorization. 8. Origins of Cryptography. 9. Game Theory. 10. The Psychology of Gender. 11. Turing Tests. 12. Modular Arithmetic and Other Computational Methods. 13. Modern Cryptography. 14. Steganography and Relation to Crypto. 15. A Metric to Measure Attacks/Defenses. 16 Behavioral Economics. 17. Fake News. 18. Exercises: "Hack Labs". 19. Conclusions.
520 ## - SUMMARY, ETC.
Summary, etc This book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists. Since the introduction and proliferation of the Internet, cybersecurity maintenance issues have grown exponentially. The importance of behavioral cybersecurity has recently been amplified by current events, such as misinformation and cyber-attacks related to election interference in the United States and internationally. More recently, similar issues have occurred in the context of the COVID-19 pandemic. The book presents profiling approaches, offers case studies of major cybersecurity events and provides analysis of password attacks and defenses. Discussing psychological methods used to assess behavioral cybersecurity, alongside risk management, the book also describes game theory and its applications, explores the role of cryptology and steganography in attack and defense scenarios and brings the reader up to date with current research into motivation and attacker/defender personality traits. Written for practitioners in the field, alongside nonspecialists with little prior knowledge of cybersecurity, computer science, or psychology, the book will be of interest to all who need to protect their computing environment from cyber-attacks. The book also provides source materials for courses in this growing area of behavioral cybersecurity.
588 ## -
-- OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer fraud.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Hacking.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Social engineering.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Cryptography
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Winston-Proctor, Cynthia E.,
Relator term author.
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Taylor & Francis
Uniform Resource Identifier https://www.taylorfrancis.com/books/9781003052029
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified OCLC metadata license agreement
Uniform Resource Identifier http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf

No items available.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue