Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Security, Privacy and User Interaction, Jakobsson Markus


Варианты приобретения
Цена: 6986.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Jakobsson Markus
Название:  Security, Privacy and User Interaction
ISBN: 9783030437534
Издательство: Springer
Классификация:


ISBN-10: 3030437531
Обложка/Формат: Hardcover
Страницы: 153
Вес: 0.42 кг.
Дата издания: 22.12.2020
Язык: English
Размер: 23.39 x 15.60 x 1.12 cm
Ссылка на Издательство: Link
Поставляется из: Германии
Описание: This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy.


Managing Cyber Risk in the Financial Sector

Название: Managing Cyber Risk in the Financial Sector
ISBN: 1138935468 ISBN-13(EAN): 9781138935464
Издательство: Taylor&Francis
Рейтинг:
Цена: 23734.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely monetary gain, hacking by people hostile to a company causing business interruption or damage to reputation, theft by criminals or malicious individuals of the very large amounts of customer information (“big data”) held by many companies, misuse including accidental misuse or lack of use of such data, loss of key intellectual property, and the theft of health and medical data which can have a profound effect on the insurance sector. This book assesses the major cyber risks to businesses and discusses how they can be managed and the risks reduced. It includes case studies of the situation in different financial sectors and countries in relation to East Asia, Europe and the United States. It takes an interdisciplinary approach assessing cyber risks and management solutions from an economic, management risk, legal, security intelligence, insurance, banking and cultural perspective.

Security, Privacy, and Applied Cryptography Engineering

Автор: Carlet
Название: Security, Privacy, and Applied Cryptography Engineering
ISBN: 3319494449 ISBN-13(EAN): 9783319494449
Издательство: Springer
Рейтинг:
Цена: 9224.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the refereed proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016, held in Hyderabad, India, in December 2016. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering.

Trust, Privacy and Security in Digital Business

Автор: Katsikas
Название: Trust, Privacy and Security in Digital Business
ISBN: 3319443402 ISBN-13(EAN): 9783319443409
Издательство: Springer
Рейтинг:
Цена: 5870.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the refereed proceedings of the 13th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2016, held in Porto, Portugal, in September 2016 in conjunction with DEXA 2016. The papers are organized in the following topical sections: security, privacy and trust in eServices;

Audacity to spy

Автор: Nolan, Catherine Wilson, Ashley M.
Название: Audacity to spy
ISBN: 1935504797 ISBN-13(EAN): 9781935504795
Издательство: Gazelle Book Services
Рейтинг:
Цена: 4502.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Ever get the feeling you are being watched? The thieves that steal identities are using cutting-edge, high-tech tools that can take one fact from a social media site, another from an online travel survey, a third from a purchase made via the internet and even access highly confidential medical records. Little by little they piece together your buying habits, your religious and school affiliations, the names of your family and pets, your political views, your driving habits, the places you have vacationed, and much, much more. This is not science fiction and this is not the future, this is what is happening to each and every one of us now - today. And although the vast majority of adults say they are concerned about providing personal information online, nearly 1/3 say they have never used a privacy setting on their computer, never inquired about the charities to whom they donate their money, never worried about someone accessing their medical information and never thought twice about giving a financial institution their social security number over the internet. The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. Yes, you should be concerned about the NSA and other government agencies having your phone logs and emails; but you should worry more about the insidious data brokers that are collecting information about you every time you log on to your laptop, use your cell phone, access an app, or use your GPS. Companies are collecting a variety of data about you, combining it with location information, and using it to both personalise their own services and to sell to other advertisers for behavioural marketing. Law enforcement agencies are tracking your car and insurance companies are installing devices to monitor your driving. Clerks are making copies of your credit cards. And if that wasnt enough, the FBI has reported that hackers have been discovered embedding malicious software in two million computers, opening a virtual door for criminals to rifle through users valuable personal and financial information. More than warning you about the ways your data can be stolen, at the end of each chapter are suggestions for limiting the amount of personal data that is available to be seized and divulged. Can you completely cut off the flow of information about yourself? The answer is no, not completely - there is already too much data out there and increasingly sophisticated ways to obtain bits and pieces. But knowing how it is collected, and by whom, gives you the power to control sensitive information and determine how much of your life you wish to expose to those more than willing to exploit it.

Design, User Experience, and Usability: User Experience Design for Diverse Interaction Platforms and Environments

Автор: Aaron Marcus
Название: Design, User Experience, and Usability: User Experience Design for Diverse Interaction Platforms and Environments
ISBN: 3319076256 ISBN-13(EAN): 9783319076256
Издательство: Springer
Рейтинг:
Цена: 13416.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Design for the web.- Design for the mobile experience.- Design of visual information.- Design for novel interaction techniques and realities.- Games and gamification.

Security and Privacy in User Modeling

Автор: J. Schreck
Название: Security and Privacy in User Modeling
ISBN: 9048162238 ISBN-13(EAN): 9789048162239
Издательство: Springer
Рейтинг:
Цена: 11179.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: User-adaptive (or "personalized") systems take individual character- istics of their current users into account and adapt their behavior ac- cordingly. Studies show that web visitors indeed spend considerably more time at personalized than at regular portals and view considerably more web pages.

Why Don`t We Defend Better?: Data Breaches, Risk Management, and Public Policy

Автор: Robert H. Sloan, Richard Warner
Название: Why Don`t We Defend Better?: Data Breaches, Risk Management, and Public Policy
ISBN: 0815356625 ISBN-13(EAN): 9780815356622
Издательство: Taylor&Francis
Рейтинг:
Цена: 8420.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The wave of data breaches raises two pressing questions: Why don`t we defend our networks better? And, what practical incentives can we create to improve our defenses? This book answers those questions.

Human-Computer Interaction. Novel User Experiences

Автор: Kurosu
Название: Human-Computer Interaction. Novel User Experiences
ISBN: 3319395122 ISBN-13(EAN): 9783319395128
Издательство: Springer
Рейтинг:
Цена: 11460.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The 3-volume set LNCS 9731, 9732, and 9733 constitutes the refereed proceedings of the 18th International Conference on Human-Computer Interaction, HCII 2016, held in Toronto, ON, Canada, in July 2016.

Security, Privacy and Digital Forensics in the Clo ud

Автор: Chen
Название: Security, Privacy and Digital Forensics in the Clo ud
ISBN: 1119053285 ISBN-13(EAN): 9781119053286
Издательство: Wiley
Рейтинг:
Цена: 14882.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Explains both cloud security and privacy, and digital forensics in a unique, systematical way * Discusses both security and privacy of cloud and digital forensics in a systematic way * Contributions by top U.S.

Trusted Computing: Principles and Applications

Автор: Dengguo Feng
Название: Trusted Computing: Principles and Applications
ISBN: 3110476045 ISBN-13(EAN): 9783110476040
Издательство: Walter de Gruyter
Рейтинг:
Цена: 18586.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Color Image Watermarking: Algorithms and Technologies

Автор: Qingtang Su
Название: Color Image Watermarking: Algorithms and Technologies
ISBN: 3110487578 ISBN-13(EAN): 9783110487572
Издательство: Walter de Gruyter
Рейтинг:
Цена: 18586.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book presents watermarking algorithms derived from signal processing methods such as wavelet transform, matrix decomposition and cosine transform to address the limitations of current technologies. For each algorithm, mathematical foundations are explained with analysis conducted to evaluate performances on robotness and efficiency. Combining theories and practice, it is suitable for information security researchers and industrial engineers.

Cyber Frauds, Scams and Their Victims

Автор: Button Mark
Название: Cyber Frauds, Scams and Their Victims
ISBN: 1138931209 ISBN-13(EAN): 9781138931206
Издательство: Taylor&Francis
Рейтинг:
Цена: 6889.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book sets out the scale and nature of the cyber-fraud threat, examining the different characteristics of victims of fraud, why they fall for it and the impact upon them. It also discusses some of the emerging strategies to counter this problem.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия