Security and usability designing secure systems that people can use
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Beijing [u.a.]
O'Reilly
2005
|
Ausgabe: | 1. ed. |
Schriftenreihe: | Theory in practice
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV020049605 | ||
003 | DE-604 | ||
005 | 20211210 | ||
007 | t | ||
008 | 050929s2005 ad|| |||| 00||| eng d | ||
016 | 7 | |a 975097105 |2 DE-101 | |
020 | |a 0596008279 |9 0-596-00827-9 | ||
020 | |a 9780596008277 |9 978-0-596-00827-7 | ||
035 | |a (OCoLC)61701862 | ||
035 | |a (DE-599)BVBBV020049605 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-92 |a DE-91G |a DE-573 |a DE-355 |a DE-M347 |a DE-634 |a DE-11 |a DE-384 |a DE-Aug4 |a DE-29T |a DE-20 |a DE-473 |a DE-706 |a DE-210 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
245 | 1 | 0 | |a Security and usability |b designing secure systems that people can use |c ed. by Lorrie Faith Cranor ... |
250 | |a 1. ed. | ||
264 | 1 | |a Beijing [u.a.] |b O'Reilly |c 2005 | |
300 | |a XVIII, 714 S. |b Ill., graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Theory in practice | |
650 | 4 | |a Systèmes informatiques - Sécurité - Mesures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Benutzerfreundlichkeit |0 (DE-588)4005541-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mensch-Maschine-Kommunikation |0 (DE-588)4125909-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Mensch-Maschine-Kommunikation |0 (DE-588)4125909-9 |D s |
689 | 0 | 2 | |a Benutzerfreundlichkeit |0 (DE-588)4005541-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Cranor, Lorrie Faith |e Sonstige |0 (DE-588)1057640255 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013370556&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-013370556 |
Datensatz im Suchindex
DE-473_call_number | 681/ST 277 GA 12605 |
---|---|
DE-473_location | 7 |
DE-BY-TUM_call_number | 0102/DAT 460f 2006 A 2490 |
DE-BY-TUM_katkey | 1539002 |
DE-BY-TUM_media_number | 040020292886 |
DE-BY-UBG_katkey | 196363312 |
DE-BY-UBG_media_number | TEMP2173997 |
_version_ | 1816712541999464448 |
adam_text | TABLE
Preface
Part One Realigning Usability and Security XXj
1
Matt Bishop
2
M. Angela
3
Bruce Tognazzini
1
Clare-Marie Karat, Carolyn Brodie, and John Karat
5
Andrew S. Patrick, Pamela
Part Two AUTHENTICATION MECHANISMS
6
Karen
7
Jeff
8
Mike Just
9
Fabian Monrose and Michael K.
10
Lynne
11
Alen
12
Ugo
Part Three SECURE SYSTEMS
13
Ka-Ping
14
Robert
15
Simson Garfinkel
16
Dirk Balfanz, Glenn Durfee, and D. K. Smefters
17
A. Chris
18
Eser Kandóján
Part Four PRIVACY AND ANONYMITY SYSTEMS
19
Mark S. Ackerman and Scott D. Maimoaring
20
Benjamin Brunk
21
Scott
22
Lorrie Faith Cranor
23
David Martin
24
Batya Friedman, Peyina Lin, and Jessica K. Miller
25
Jeremy Goecks and Elizabeth D. Mynatt
26
Roger Dingledine and Nick Mathewson
Part Five COMMERCIALIZING USABILITY: THE VENDOR PERSPECTIVE
27
Jordy Berson
28
Blake Ross
29
Chris Nodder
30
in Collaborative Applications
Mary [lien Zurko
31
George Moromisato, Paul Boyd, and Nimisha Asthagiri
Part Six THE CLASSICS
32
Anne Adams and M. Angela
33
Nathaniels. Good and Aaron Krekelberg
34
Alma WhittenandJ. D. Tygar
Index
|
any_adam_object | 1 |
author_GND | (DE-588)1057640255 |
building | Verbundindex |
bvnumber | BV020049605 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 ST 277 |
classification_tum | DAT 460f |
ctrlnum | (OCoLC)61701862 (DE-599)BVBBV020049605 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02023nam a2200493 c 4500</leader><controlfield tag="001">BV020049605</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211210 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">050929s2005 ad|| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">975097105</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596008279</subfield><subfield code="9">0-596-00827-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780596008277</subfield><subfield code="9">978-0-596-00827-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)61701862</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV020049605</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-210</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and usability</subfield><subfield code="b">designing secure systems that people can use</subfield><subfield code="c">ed. by Lorrie Faith Cranor ...</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing [u.a.]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 714 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Theory in practice</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes informatiques - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Benutzerfreundlichkeit</subfield><subfield code="0">(DE-588)4005541-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mensch-Maschine-Kommunikation</subfield><subfield code="0">(DE-588)4125909-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Mensch-Maschine-Kommunikation</subfield><subfield code="0">(DE-588)4125909-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Benutzerfreundlichkeit</subfield><subfield code="0">(DE-588)4005541-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cranor, Lorrie Faith</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1057640255</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013370556&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-013370556</subfield></datafield></record></collection> |
id | DE-604.BV020049605 |
illustrated | Illustrated |
index_date | 2024-09-20T13:29:36Z |
indexdate | 2024-11-25T17:26:05Z |
institution | BVB |
isbn | 0596008279 9780596008277 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-013370556 |
oclc_num | 61701862 |
open_access_boolean | |
owner | DE-92 DE-91G DE-BY-TUM DE-573 DE-355 DE-BY-UBR DE-M347 DE-634 DE-11 DE-384 DE-Aug4 DE-29T DE-20 DE-473 DE-BY-UBG DE-706 DE-210 |
owner_facet | DE-92 DE-91G DE-BY-TUM DE-573 DE-355 DE-BY-UBR DE-M347 DE-634 DE-11 DE-384 DE-Aug4 DE-29T DE-20 DE-473 DE-BY-UBG DE-706 DE-210 |
physical | XVIII, 714 S. Ill., graph. Darst. 24 cm |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | O'Reilly |
record_format | marc |
series2 | Theory in practice |
spellingShingle | Security and usability designing secure systems that people can use Systèmes informatiques - Sécurité - Mesures Computer security Computersicherheit (DE-588)4274324-2 gnd Benutzerfreundlichkeit (DE-588)4005541-3 gnd Mensch-Maschine-Kommunikation (DE-588)4125909-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4005541-3 (DE-588)4125909-9 |
title | Security and usability designing secure systems that people can use |
title_auth | Security and usability designing secure systems that people can use |
title_exact_search | Security and usability designing secure systems that people can use |
title_full | Security and usability designing secure systems that people can use ed. by Lorrie Faith Cranor ... |
title_fullStr | Security and usability designing secure systems that people can use ed. by Lorrie Faith Cranor ... |
title_full_unstemmed | Security and usability designing secure systems that people can use ed. by Lorrie Faith Cranor ... |
title_short | Security and usability |
title_sort | security and usability designing secure systems that people can use |
title_sub | designing secure systems that people can use |
topic | Systèmes informatiques - Sécurité - Mesures Computer security Computersicherheit (DE-588)4274324-2 gnd Benutzerfreundlichkeit (DE-588)4005541-3 gnd Mensch-Maschine-Kommunikation (DE-588)4125909-9 gnd |
topic_facet | Systèmes informatiques - Sécurité - Mesures Computer security Computersicherheit Benutzerfreundlichkeit Mensch-Maschine-Kommunikation |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013370556&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT cranorlorriefaith securityandusabilitydesigningsecuresystemsthatpeoplecanuse |