Behavioral cybersecurity applications of personality psychology and computer science

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Patterson, Wayne (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Boca Raton CRC Press 2019
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000008c 4500
001 BV045931958
003 DE-604
005 20190830
007 t
008 190612s2019 a||| |||| 00||| eng d
020 |a 9781138617780  |9 978-1-138-61778-0 
035 |a (OCoLC)1110097915 
035 |a (DE-599)BVBBV045931958 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-92  |a DE-706 
084 |a CZ 1390  |0 (DE-625)19238:  |2 rvk 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
100 1 |a Patterson, Wayne  |e Verfasser  |4 aut 
245 1 0 |a Behavioral cybersecurity  |b applications of personality psychology and computer science  |c Wayne Patterson, Cynthia E. Winston-Proctor 
264 1 |a Boca Raton  |b CRC Press  |c 2019 
300 |a xxviii, 261 Seiten  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
505 8 |a What is cybersecurity? -- Essentials of behavioral science -- Psychology and cybersecurity -- Recent events -- Profiling -- Hack lab 1 : social engineering -- Access control -- The first step : authorization -- Hack lab 2 : assigned passwords in the clear -- Origins of cryptography -- Hack lab 3 : Sweeney method -- Hacker personalities : case studies -- Game theory -- Ethical hacking -- The psychology of gender -- Turing tests -- Personality tests -- Modular arithmetic and other computational methods -- Modern cryptography -- Steganography -- Crypto and stego -- A metric to measure attacks/defenses -- Behavioral economics -- Fake news -- Potpourri -- Hack lab 4 : password meters 
650 0 7 |a Cyberpsychologie  |0 (DE-588)7681383-6  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
653 0 |a Computer security 
653 0 |a Computer fraud 
653 0 |a Hacking 
653 0 |a Social engineering 
653 0 |a Computer fraud 
653 0 |a Computer security 
653 0 |a Hacking 
653 0 |a Social engineering 
689 0 0 |a Cyberpsychologie  |0 (DE-588)7681383-6  |D s 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |5 DE-604 
700 1 |a Winston-Proctor, Cynthia E.  |e Sonstige  |4 oth 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-0-429-461484 
999 |a oai:aleph.bib-bvb.de:BVB01-031314373 

Datensatz im Suchindex

_version_ 1804180121014239232
any_adam_object
author Patterson, Wayne
author_facet Patterson, Wayne
author_role aut
author_sort Patterson, Wayne
author_variant w p wp
building Verbundindex
bvnumber BV045931958
classification_rvk CZ 1390
ST 276
contents What is cybersecurity? -- Essentials of behavioral science -- Psychology and cybersecurity -- Recent events -- Profiling -- Hack lab 1 : social engineering -- Access control -- The first step : authorization -- Hack lab 2 : assigned passwords in the clear -- Origins of cryptography -- Hack lab 3 : Sweeney method -- Hacker personalities : case studies -- Game theory -- Ethical hacking -- The psychology of gender -- Turing tests -- Personality tests -- Modular arithmetic and other computational methods -- Modern cryptography -- Steganography -- Crypto and stego -- A metric to measure attacks/defenses -- Behavioral economics -- Fake news -- Potpourri -- Hack lab 4 : password meters
ctrlnum (OCoLC)1110097915
(DE-599)BVBBV045931958
discipline Informatik
Psychologie
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02257nam a22004698c 4500</leader><controlfield tag="001">BV045931958</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190830 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">190612s2019 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781138617780</subfield><subfield code="9">978-1-138-61778-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1110097915</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045931958</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">CZ 1390</subfield><subfield code="0">(DE-625)19238:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Patterson, Wayne</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Behavioral cybersecurity</subfield><subfield code="b">applications of personality psychology and computer science</subfield><subfield code="c">Wayne Patterson, Cynthia E. Winston-Proctor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxviii, 261 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">What is cybersecurity? -- Essentials of behavioral science -- Psychology and cybersecurity -- Recent events -- Profiling -- Hack lab 1 : social engineering -- Access control -- The first step : authorization -- Hack lab 2 : assigned passwords in the clear -- Origins of cryptography -- Hack lab 3 : Sweeney method -- Hacker personalities : case studies -- Game theory -- Ethical hacking -- The psychology of gender -- Turing tests -- Personality tests -- Modular arithmetic and other computational methods -- Modern cryptography -- Steganography -- Crypto and stego -- A metric to measure attacks/defenses -- Behavioral economics -- Fake news -- Potpourri -- Hack lab 4 : password meters</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberpsychologie</subfield><subfield code="0">(DE-588)7681383-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer fraud</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Social engineering</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer fraud</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Social engineering</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberpsychologie</subfield><subfield code="0">(DE-588)7681383-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Winston-Proctor, Cynthia E.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-0-429-461484</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031314373</subfield></datafield></record></collection>
id DE-604.BV045931958
illustrated Illustrated
indexdate 2024-07-10T08:30:43Z
institution BVB
isbn 9781138617780
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-031314373
oclc_num 1110097915
open_access_boolean
owner DE-92
DE-706
owner_facet DE-92
DE-706
physical xxviii, 261 Seiten Illustrationen, Diagramme
publishDate 2019
publishDateSearch 2019
publishDateSort 2019
publisher CRC Press
record_format marc
spelling Patterson, Wayne Verfasser aut
Behavioral cybersecurity applications of personality psychology and computer science Wayne Patterson, Cynthia E. Winston-Proctor
Boca Raton CRC Press 2019
xxviii, 261 Seiten Illustrationen, Diagramme
txt rdacontent
n rdamedia
nc rdacarrier
What is cybersecurity? -- Essentials of behavioral science -- Psychology and cybersecurity -- Recent events -- Profiling -- Hack lab 1 : social engineering -- Access control -- The first step : authorization -- Hack lab 2 : assigned passwords in the clear -- Origins of cryptography -- Hack lab 3 : Sweeney method -- Hacker personalities : case studies -- Game theory -- Ethical hacking -- The psychology of gender -- Turing tests -- Personality tests -- Modular arithmetic and other computational methods -- Modern cryptography -- Steganography -- Crypto and stego -- A metric to measure attacks/defenses -- Behavioral economics -- Fake news -- Potpourri -- Hack lab 4 : password meters
Cyberpsychologie (DE-588)7681383-6 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Computer security
Computer fraud
Hacking
Social engineering
Cyberpsychologie (DE-588)7681383-6 s
Computersicherheit (DE-588)4274324-2 s
DE-604
Winston-Proctor, Cynthia E. Sonstige oth
Erscheint auch als Online-Ausgabe 978-0-429-461484
spellingShingle Patterson, Wayne
Behavioral cybersecurity applications of personality psychology and computer science
What is cybersecurity? -- Essentials of behavioral science -- Psychology and cybersecurity -- Recent events -- Profiling -- Hack lab 1 : social engineering -- Access control -- The first step : authorization -- Hack lab 2 : assigned passwords in the clear -- Origins of cryptography -- Hack lab 3 : Sweeney method -- Hacker personalities : case studies -- Game theory -- Ethical hacking -- The psychology of gender -- Turing tests -- Personality tests -- Modular arithmetic and other computational methods -- Modern cryptography -- Steganography -- Crypto and stego -- A metric to measure attacks/defenses -- Behavioral economics -- Fake news -- Potpourri -- Hack lab 4 : password meters
Cyberpsychologie (DE-588)7681383-6 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)7681383-6
(DE-588)4274324-2
title Behavioral cybersecurity applications of personality psychology and computer science
title_auth Behavioral cybersecurity applications of personality psychology and computer science
title_exact_search Behavioral cybersecurity applications of personality psychology and computer science
title_full Behavioral cybersecurity applications of personality psychology and computer science Wayne Patterson, Cynthia E. Winston-Proctor
title_fullStr Behavioral cybersecurity applications of personality psychology and computer science Wayne Patterson, Cynthia E. Winston-Proctor
title_full_unstemmed Behavioral cybersecurity applications of personality psychology and computer science Wayne Patterson, Cynthia E. Winston-Proctor
title_short Behavioral cybersecurity
title_sort behavioral cybersecurity applications of personality psychology and computer science
title_sub applications of personality psychology and computer science
topic Cyberpsychologie (DE-588)7681383-6 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Cyberpsychologie
Computersicherheit
work_keys_str_mv AT pattersonwayne behavioralcybersecurityapplicationsofpersonalitypsychologyandcomputerscience
AT winstonproctorcynthiae behavioralcybersecurityapplicationsofpersonalitypsychologyandcomputerscience