Behavioral cybersecurity : (Record no. 128685)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03890cam a22005651i 4500 |
001 - CONTROL NUMBER | |
control field | 9781003052029 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | FlBoTFG |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220509193034.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION | |
fixed length control field | m d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr ||||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200903r20202019flua ob 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | OCoLC-P |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | OCoLC-P |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000258332 |
-- | (ePub ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000258335 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000258257 |
-- | (PDF ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000258254 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000258295 |
-- | (Mobipocket ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000258297 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781003052029 |
-- | (ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1003052029 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Cancelled/invalid ISBN | 9780367509798 (hbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Cancelled/invalid ISBN | 0367509792 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1201/9781003052029 |
Source of number or code | doi |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1222806311 |
Canceled/invalid control number | (OCoLC)1201675705 |
-- | (OCoLC)1222799725 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC-P)1222806311 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 083000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | JMAL |
Source | bicssc |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Patterson, Wayne, |
Dates associated with a name | 1945- |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Behavioral cybersecurity : |
Remainder of title | fundamental principles and applications of personality psychology / |
Statement of responsibility, etc | Wayne Patterson, Cynthia E. Winston-Proctor. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st. |
264 #1 - | |
-- | Boca Raton : |
-- | CRC Press, |
-- | 2020. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource : |
Other physical details | illustrations (black and white) |
336 ## - | |
-- | text |
-- | rdacontent |
336 ## - | |
-- | still image |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | rdacarrier |
500 ## - GENERAL NOTE | |
General note | Originally published: 2019. |
500 ## - GENERAL NOTE | |
General note | 1. Recent Events. 2. Behavioral Cybersecurity. 3. Personality Psychology Theory and Methods of Assessment. 4. Hacker Case Study Personality Analysis and Ethical Hacking. 5. Profiling. 6. Access Control. 7. The First Step: Authorization. 8. Origins of Cryptography. 9. Game Theory. 10. The Psychology of Gender. 11. Turing Tests. 12. Modular Arithmetic and Other Computational Methods. 13. Modern Cryptography. 14. Steganography and Relation to Crypto. 15. A Metric to Measure Attacks/Defenses. 16 Behavioral Economics. 17. Fake News. 18. Exercises: "Hack Labs". 19. Conclusions. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists. Since the introduction and proliferation of the Internet, cybersecurity maintenance issues have grown exponentially. The importance of behavioral cybersecurity has recently been amplified by current events, such as misinformation and cyber-attacks related to election interference in the United States and internationally. More recently, similar issues have occurred in the context of the COVID-19 pandemic. The book presents profiling approaches, offers case studies of major cybersecurity events and provides analysis of password attacks and defenses. Discussing psychological methods used to assess behavioral cybersecurity, alongside risk management, the book also describes game theory and its applications, explores the role of cryptology and steganography in attack and defense scenarios and brings the reader up to date with current research into motivation and attacker/defender personality traits. Written for practitioners in the field, alongside nonspecialists with little prior knowledge of cybersecurity, computer science, or psychology, the book will be of interest to all who need to protect their computing environment from cyber-attacks. The book also provides source materials for courses in this growing area of behavioral cybersecurity. |
588 ## - | |
-- | OCLC-licensed vendor bibliographic record. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer fraud. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Hacking. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Social engineering. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS / Cryptography |
Source of heading or term | bisacsh |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Winston-Proctor, Cynthia E., |
Relator term | author. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Taylor & Francis |
Uniform Resource Identifier | https://www.taylorfrancis.com/books/9781003052029 |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | OCLC metadata license agreement |
Uniform Resource Identifier | http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
No items available.