Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary

Behavioral cybersecurity. Wayne Patterson, Cynthia Winston-Proctor.

By: Contributor(s): Material type: TextTextPublication details: Boca Raton CRC Press 2021Edition: First editionDescription: xvi; 172 pagesISBN:
  • 9780367509798
Subject(s): DDC classification:
  • 005.8 PAT
Summary: "The importance of behavioral cybersecurity has recently been amplified by current events, such as misinformation and cyber-attacks related to election interference - in the United States and internationally. More recently, similar issues have occurred in the context of the COVID-19 pandemic. The book presents profiling approaches, offers case studies of major cybersecurity events and provides analysis of password attacks and defenses. Discussing psychological methods used to assess behavioral cybersecurity, alongside risk management, the book also describes game theory and its applications, explores the role of cryptology and steganography in attack and defense scenarios and brings the reader up to date with current research into motivation and attacker/defender personality traits"--
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Home library Call number Status Date due Barcode
Book Book Dept. of Computer Science General Stacks Dept. of Computer Science 005.8 PAT (Browse shelf(Opens below)) Available DCS4901

Includes bibliographical references and index.

"The importance of behavioral cybersecurity has recently been amplified by current events, such as misinformation and cyber-attacks related to election interference - in the United States and internationally. More recently, similar issues have occurred in the context of the COVID-19 pandemic. The book presents profiling approaches, offers case studies of major cybersecurity events and provides analysis of password attacks and defenses. Discussing psychological methods used to assess behavioral cybersecurity, alongside risk management, the book also describes game theory and its applications, explores the role of cryptology and steganography in attack and defense scenarios and brings the reader up to date with current research into motivation and attacker/defender personality traits"--

There are no comments on this title.

to post a comment.