Behavioral cybersecurity : applications of personality psychology and computer science / Wayne Patterson and Cynthia E. Winston-Proctor.
By: Patterson, Wayne [author.].
Contributor(s): Winston-Proctor, Cynthia E [author.].
Publisher: Boca Raton : Taylor & Francis, CRC Press, ©2019Description: 261 p.Content type: text Media type: unmediated Carrier type: volumeISBN: 9781138617780 (hardback : alk. paper).Subject(s): Computer security | Computer fraud | Hacking | Social engineeringGenre/Form: Print books.Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | QA76.9.A25 P3845 2019 (Browse shelf) | Available | AU00000000015537 |
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
No cover image available | ||||||||
QA76.9 .A25 P37 2018 Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies / | QA76.9.A25 P375 2019 A leader's guide to cybersecurity : why boards need to lead--and how to do it / | QA76.9.A25 P379 2019 CompTIA CySA+ cybersecurity analyst certification practice exams (Exam CS0-001) / | QA76.9.A25 P3845 2019 Behavioral cybersecurity : applications of personality psychology and computer science / | QA76.9.A25 Q334 2019 The digital big bang : the hard stuff, the soft stuff, and the future of cybersecurity / | QA76.9 .A25 R363 2015 Kali Linux wireless penetration testing : master wireless testing techniques to survey and attack wireless networks with Kali Linux / | QA76.9. A25 R37 2021 Cybersecurity and Third-Party Risk / |
What is cybersecurity? -- Essentials of behavioral science -- Psychology and cybersecurity -- Recent events -- Profiling -- Hack lab 1 : social engineering -- Access control -- The first step : authorization -- Hack lab 2 : assigned passwords in the clear -- Origins of cryptography -- Hack lab 3 : Sweeney method -- Hacker personalities : case studies -- Game theory -- Ethical hacking -- The psychology of gender -- Turing tests -- Personality tests -- Modular arithmetic and other computational methods -- Modern cryptography -- Steganography -- Crypto and stego -- A metric to measure attacks/defenses -- Behavioral economics -- Fake news -- Potpourri -- Hack lab 4 : password meters.