Security and usability designing secure systems that people can use

Gespeichert in:
Bibliographische Detailangaben
Format: Buch
Sprache:English
Veröffentlicht: Beijing [u.a.] O'Reilly 2005
Ausgabe:1. ed.
Schriftenreihe:Theory in practice
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV020049605
003 DE-604
005 20211210
007 t
008 050929s2005 ad|| |||| 00||| eng d
016 7 |a 975097105  |2 DE-101 
020 |a 0596008279  |9 0-596-00827-9 
020 |a 9780596008277  |9 978-0-596-00827-7 
035 |a (OCoLC)61701862 
035 |a (DE-599)BVBBV020049605 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
049 |a DE-92  |a DE-91G  |a DE-573  |a DE-355  |a DE-M347  |a DE-634  |a DE-11  |a DE-384  |a DE-Aug4  |a DE-29T  |a DE-20  |a DE-473  |a DE-706  |a DE-210 
050 0 |a QA76.9.A25 
082 0 |a 005.8  |2 22 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
084 |a 004  |2 sdnb 
084 |a DAT 460f  |2 stub 
245 1 0 |a Security and usability  |b designing secure systems that people can use  |c ed. by Lorrie Faith Cranor ... 
250 |a 1. ed. 
264 1 |a Beijing [u.a.]  |b O'Reilly  |c 2005 
300 |a XVIII, 714 S.  |b Ill., graph. Darst.  |c 24 cm 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 0 |a Theory in practice 
650 4 |a Systèmes informatiques - Sécurité - Mesures 
650 4 |a Computer security 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Benutzerfreundlichkeit  |0 (DE-588)4005541-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Mensch-Maschine-Kommunikation  |0 (DE-588)4125909-9  |2 gnd  |9 rswk-swf 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 1 |a Mensch-Maschine-Kommunikation  |0 (DE-588)4125909-9  |D s 
689 0 2 |a Benutzerfreundlichkeit  |0 (DE-588)4005541-3  |D s 
689 0 |5 DE-604 
700 1 |a Cranor, Lorrie Faith  |e Sonstige  |0 (DE-588)1057640255  |4 oth 
856 4 2 |m Digitalisierung UB Regensburg  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013370556&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
999 |a oai:aleph.bib-bvb.de:BVB01-013370556 

Datensatz im Suchindex

DE-473_call_number 681/ST 277 GA 12605
DE-473_location 7
DE-BY-TUM_call_number 0102/DAT 460f 2006 A 2490
DE-BY-TUM_katkey 1539002
DE-BY-TUM_media_number 040020292886
DE-BY-UBG_katkey 196363312
DE-BY-UBG_media_number TEMP2173997
_version_ 1816712541999464448
adam_text TABLE Preface Part One Realigning Usability and Security XXj 1 Matt Bishop 2 M. Angela 3 Bruce Tognazzini 1 Clare-Marie Karat, Carolyn Brodie, and John Karat 5 Andrew S. Patrick, Pamela Part Two AUTHENTICATION MECHANISMS 6 Karen 7 Jeff 8 Mike Just 9 Fabian Monrose and Michael K. 10 Lynne 11 Alen 12 Ugo Part Three SECURE SYSTEMS 13 Ka-Ping 14 Robert 15 Simson Garfinkel 16 Dirk Balfanz, Glenn Durfee, and D. K. Smefters 17 A. Chris 18 Eser Kandóján Part Four PRIVACY AND ANONYMITY SYSTEMS 19 Mark S. Ackerman and Scott D. Maimoaring 20 Benjamin Brunk 21 Scott 22 Lorrie Faith Cranor 23 David Martin 24 Batya Friedman, Peyina Lin, and Jessica K. Miller 25 Jeremy Goecks and Elizabeth D. Mynatt 26 Roger Dingledine and Nick Mathewson Part Five COMMERCIALIZING USABILITY: THE VENDOR PERSPECTIVE 27 Jordy Berson 28 Blake Ross 29 Chris Nodder 30 in Collaborative Applications Mary [lien Zurko 31 George Moromisato, Paul Boyd, and Nimisha Asthagiri Part Six THE CLASSICS 32 Anne Adams and M. Angela 33 Nathaniels. Good and Aaron Krekelberg 34 Alma WhittenandJ. D. Tygar Index
any_adam_object 1
author_GND (DE-588)1057640255
building Verbundindex
bvnumber BV020049605
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
classification_rvk ST 276
ST 277
classification_tum DAT 460f
ctrlnum (OCoLC)61701862
(DE-599)BVBBV020049605
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition 1. ed.
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02023nam a2200493 c 4500</leader><controlfield tag="001">BV020049605</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211210 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">050929s2005 ad|| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">975097105</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596008279</subfield><subfield code="9">0-596-00827-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780596008277</subfield><subfield code="9">978-0-596-00827-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)61701862</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV020049605</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-210</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and usability</subfield><subfield code="b">designing secure systems that people can use</subfield><subfield code="c">ed. by Lorrie Faith Cranor ...</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing [u.a.]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 714 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Theory in practice</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes informatiques - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Benutzerfreundlichkeit</subfield><subfield code="0">(DE-588)4005541-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mensch-Maschine-Kommunikation</subfield><subfield code="0">(DE-588)4125909-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Mensch-Maschine-Kommunikation</subfield><subfield code="0">(DE-588)4125909-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Benutzerfreundlichkeit</subfield><subfield code="0">(DE-588)4005541-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cranor, Lorrie Faith</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1057640255</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=013370556&amp;sequence=000002&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-013370556</subfield></datafield></record></collection>
id DE-604.BV020049605
illustrated Illustrated
index_date 2024-09-20T13:29:36Z
indexdate 2024-11-25T17:26:05Z
institution BVB
isbn 0596008279
9780596008277
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-013370556
oclc_num 61701862
open_access_boolean
owner DE-92
DE-91G
DE-BY-TUM
DE-573
DE-355
DE-BY-UBR
DE-M347
DE-634
DE-11
DE-384
DE-Aug4
DE-29T
DE-20
DE-473
DE-BY-UBG
DE-706
DE-210
owner_facet DE-92
DE-91G
DE-BY-TUM
DE-573
DE-355
DE-BY-UBR
DE-M347
DE-634
DE-11
DE-384
DE-Aug4
DE-29T
DE-20
DE-473
DE-BY-UBG
DE-706
DE-210
physical XVIII, 714 S. Ill., graph. Darst. 24 cm
publishDate 2005
publishDateSearch 2005
publishDateSort 2005
publisher O'Reilly
record_format marc
series2 Theory in practice
spellingShingle Security and usability designing secure systems that people can use
Systèmes informatiques - Sécurité - Mesures
Computer security
Computersicherheit (DE-588)4274324-2 gnd
Benutzerfreundlichkeit (DE-588)4005541-3 gnd
Mensch-Maschine-Kommunikation (DE-588)4125909-9 gnd
subject_GND (DE-588)4274324-2
(DE-588)4005541-3
(DE-588)4125909-9
title Security and usability designing secure systems that people can use
title_auth Security and usability designing secure systems that people can use
title_exact_search Security and usability designing secure systems that people can use
title_full Security and usability designing secure systems that people can use ed. by Lorrie Faith Cranor ...
title_fullStr Security and usability designing secure systems that people can use ed. by Lorrie Faith Cranor ...
title_full_unstemmed Security and usability designing secure systems that people can use ed. by Lorrie Faith Cranor ...
title_short Security and usability
title_sort security and usability designing secure systems that people can use
title_sub designing secure systems that people can use
topic Systèmes informatiques - Sécurité - Mesures
Computer security
Computersicherheit (DE-588)4274324-2 gnd
Benutzerfreundlichkeit (DE-588)4005541-3 gnd
Mensch-Maschine-Kommunikation (DE-588)4125909-9 gnd
topic_facet Systèmes informatiques - Sécurité - Mesures
Computer security
Computersicherheit
Benutzerfreundlichkeit
Mensch-Maschine-Kommunikation
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013370556&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT cranorlorriefaith securityandusabilitydesigningsecuresystemsthatpeoplecanuse