Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Usable security : (Record no. 562088)

000 -LEADER
fixed length control field 05614nam a2200697 i 4500
001 - CONTROL NUMBER
control field 6920435
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200413152915.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 141016s2014 caua foab 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781627055307
Qualifying information ebook
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781627055291
Qualifying information print
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.2200/S00594ED1V01Y201408SPT011
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl00404118
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)893101704
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number G278 2014
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR)
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) MoCl
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Garfinkel, Simson.,
Relator term author.
245 10 - TITLE STATEMENT
Title Usable security :
Remainder of title history, themes, and challenges /
Statement of responsibility, etc. Simson Garfinkel, Heather Richter Lipford.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) :
Name of producer, publisher, distributor, manufacturer Morgan & Claypool,
Date of production, publication, distribution, manufacture, or copyright notice 2014.
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (xiv, 150 pages) :
Other physical details illustrations.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Synthesis lectures on information security, privacy, and trust,
International Standard Serial Number 1945-9750 ;
Volume/sequential designation # 11
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat Reader.
500 ## - GENERAL NOTE
General note Part of: Synthesis digital library of engineering and computer science.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 109-147).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction -- 1.1 Why usable privacy and security is hard -- 1.2 Why usable security research is hard -- 1.3 This book -- 1.4 Methodology -- 1.5 Scope -- 1.6 Definitions -- 1.6.1 Security -- 1.6.2 Usability -- 1.6.3 Privacy -- 1.7 Related surveys and studies --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2. A brief history of usable privacy and security research -- 2.1 Early work (1975-1995) -- 2.2 The birth of UPS (1995-2000) -- 2.3 Creation of the UPS research community (2000-2005) -- 2.4 Mechanical Turk -- 2.5 Current UPS publishing venues --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3. Major themes in UPS academic research -- 3.1 User authentication -- 3.1.1 Text passwords -- 3.1.2 Password managers -- 3.1.3 Graphical authentication -- 3.1.4 Biometrics -- 3.1.5 Token-based authentication -- 3.1.6 Mental computation and one-time passwords -- 3.1.7 CAPTCHAs -- 3.1.8 Fallback and backup authentication -- 3.2 Email security and PKI -- 3.2.1 Automatic, transparent encryption -- 3.2.2 Future of secure messaging -- 3.3 Anti-phishing efforts -- 3.3.1 A brief history of phishing -- 3.3.2 Passive security indicators -- 3.3.3 Active security warnings -- 3.3.4 Training -- 3.3.5 Password managers -- 3.4 Storage -- 3.5 Device pairing -- 3.6 Web privacy and fair information practice -- 3.6.1 Privacy policies -- 3.6.2 P3P -- 3.6.3 Behavioral advertising -- 3.6.4 Summary -- 3.7 Policy specification and interaction -- 3.8 Mobile security and privacy -- 3.8.1 Location privacy -- 3.8.2 Application platforms -- 3.8.3 Mobile authentication -- 3.9 Social media privacy -- 3.10 Security administrators --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. Lessons learned -- 4.1 Reduce decisions -- 4.2 Safe and secure defaults -- 4.3 Provide users with better information, not more information -- 4.4 Users require clear context to make good decisions -- 4.5 Information presentation is critical -- 4.6 Education works, but has limits --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5. Research challenges -- 5.1 Subject challenge: authentication -- 5.2 Subject challenge: adversary modeling -- 5.3 Subject challenge: administrators and system administration -- 5.4 Subject challenge: consumer privacy -- 5.5 Subject challenge: social computing -- 5.6 Domain challenge: ecological validity -- 5.7 Domain challenge: teaching --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6. Conclusion: the next ten years -- Bibliography -- Authors' biographies.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Abstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0# - CITATION/REFERENCES NOTE
Name of source Compendex
510 0# - CITATION/REFERENCES NOTE
Name of source INSPEC
510 0# - CITATION/REFERENCES NOTE
Name of source Google scholar
510 0# - CITATION/REFERENCES NOTE
Name of source Google book search
520 3# - SUMMARY, ETC.
Summary, etc. There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as "usable security." Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to date on usable security and privacy, creates a taxonomy for organizing that work, outlines current research objectives, presents lessons learned, and makes suggestions for future research.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF title page (viewed on October 16, 2014).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term usable privacy and security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term passwords
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term device pairing
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term privacy
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term authentication
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term privacy policies
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lipford, Heather Richter.,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781627055291
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis digital library of engineering and computer science.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis lectures on information security, privacy, and trust ;
Volume/sequential designation # 11.
International Standard Serial Number 1945-9750
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to full text
Uniform Resource Identifier http://dx.doi.org/10.2200/S00594ED1V01Y201408SPT011
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier http://ieeexplore.ieee.org/servlet/opac?bknumber=6920435
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Barcode Date last seen Price effective from Koha item type
        PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 2020-04-13 EBKE588 2020-04-13 2020-04-13 E books

Powered by Koha