Big Data um sinnvolle Entscheidungen zur Optimierung zu treffen billig mit welchen Versandkosten er bei seiner Bestellung zu rechnen hat Diese Daten werden auf dem Gerät des Besuchers gespeichert Warum? Wer Onlineshops besucht, schließt mit der Bestellung einen Vertrag ab um die im Onlineshop gekauften Waren oder Dienstleistungen zu bezahlen SEM Warum? Wer Onlineshops besucht, schließt mit der Bestellung einen Vertrag ab 1143 1061Index 1059Bibliography No" Says "Computer Beyond 29 1058Chapter reading 1057Further problems 1056Research Summary 105328.6 directions research New 105228.5.2 directive goods of Sales The 105128.5.1 Sustainability 105028.5 2019 Act Cybersecurity The 104928.4.3 regulation security and safety Modernising 104628.4.2 cars of security and safety electronic The 104428.4.1 security and safety of entanglement The 104228.4 assurance Process 104028.3.4 software open-source and Free 103928.3.3 review Hostile 103628.3.2 models growth Reliability 103628.3.1 dependability of dynamics and Metrics 103428.3 steps Next 103228.2.9 Complacency' Maximum of 'Principle The 103128.2.8 profiles protection Collaborative 102928.2.7.3 Criteria Common the with wrong goes What 102728.2.7.2 details gory The 102628.2.7.1 criteria common The 102628.2.7 HSMs and 140 FIPS 102528.2.6 book Orange The 102328.2.5 safety Aviation 102028.2.4 safety device Medical 101928.2.3 regimes evaluation Safety 101928.2.2 locks and Alarms 101828.2.1 Evaluation 101528.2 Introduction 101528.1 Sustainability and Assurance 28 1012Chapter reading 1011Further problems 1010Research Summary 101027.7 finally... And 100827.6.6 workflow your Evolving 100827.6.5 properties Emergent 100727.6.4 attitudes and skills Nurturing 100527.6.3 Diversity 100427.6.2 engineers Elite 100427.6.1 team the Managing 100027.6 risk of mismanagement Organizational 99927.5.8 management event and incident Security 99827.5.7.3 disclosure Coordinated 99727.5.7.2 system CVE The 99527.5.7.1 cycle vulnerability The 99427.5.7 system learning a Creating 99227.5.6.3 ecosystem Google The 99127.5.6.2 ecosystem Azure The 99127.5.6.1 DevSecOps to DevOps From 98827.5.6 Service a as Software 98727.5.5 development Gated 98527.5.4 lifecycle development secure The 98327.5.3 agile to spiral from design: Iterative 98127.5.2 design Top-down 98027.5.1 Methodology 97827.5 goals protection Prioritising 97527.4 risks Quantifying 97327.3.6 modelling Threat 97227.3.5 analysis effects and modes Failure 97127.3.4 trees threat and trees Fault 97127.3.3 analysis Hazard 97027.3.2 methodologies engineering Safety 96927.3.1 systems safety-critical from Lessons 96627.3 management Risk 96527.2 Introduction 96527.1 Development Systems Secure 27 962Chapter reading 962Further problems 961Research Summary 96026.8 information of Freedom 95826.7 Fragmentation? 95626.6.3 USA the in regulation Privacy 95326.6.2 protection data European 95326.6.1 protection data and Privacy 95126.6 wrong goes What 95026.5.3 evidence of Admissibility 94826.5.2 Forensics 94826.5.1 evidence of rules and Forensics 94426.5 radicalisation and speech hate Filtering, 94226.4.2 regimes authoritarian by Censorship 94126.4.1 Censorship 94026.4 response democratic The 93826.3.4 institutions of role The 93726.3.3 violence political of psychology The 93626.3.2 violence political of Causes 93626.3.1 Terrorism 93426.3 control Export 93126.2.8 spotty going - 2 CryptoWar 92826.2.7.4 chip Clipper the - 1 CryptoWar 92726.2.7.3 research crypto and DES 92626.2.7.2 policy crypto to story back The 92526.2.7.1 wars crypto The 92226.2.7 systems of system Eyes' Five The 92126.2.6 CSPs and ISPs 92026.2.5 processing Algorithmic 91926.2.4 data location and terms Search 91626.2.3 (CDRs) records data Call 91226.2.2 wiretapping government of history The 91226.2.1 Surveillance 90926.2 Introduction 90926.1 Privacy? or Surveillance 26 IIIChapter 905Part reading 904Further problems 904Research Summary 90025.6 hard are elections electronic Why 89925.5.5 independence Software 89825.5.4 scan Optical 89625.5.3 chads Hanging 89625.5.2 machines voting of history The 89525.5.1 Elections 89325.5 Bond James Bond. name's The 89125.4.5 together all it Putting 89025.4.4 land the off Living 88725.4.3 support Social 88525.4.2 devices messaging Anonymous 88225.4.1 security operational and PETS 87925.4 society and ML 87625.3.3 systems ML on Attacks 87525.3.2 security and ML 87425.3.1 ML / AI 87225.3 car self-driving a hack to How 86925.2.4 automation of limits and levels The 86725.2.3 cars Self-driving 86625.2.2 Drones 86625.2.1 vehicles remotely-piloted and Autonomous 86525.2 Introduction 86525.1 Directions? New 25 863Chapter reading 862Further problems 862Research Summary 86024.7 control Accessory 85924.6 benefits? Who 85724.5.2 lobby IP The 85424.5.1 Policy 85124.5 schemes marking copyright on Attacks 84924.4.3 techniques hiding information General 84924.4.2 management generation copy and Watermarks 84824.4.1 hiding Information 84724.4 rights design hardware Managing 84524.3.6 systems Peer-to-peer 84324.3.5 DRM and cheating, Gaming, 84124.3.4 obfuscation Software 84024.3.3 systems DRM other and HTML5 FairPlay, 83924.3.2 management rights media Windows 83824.3.1 computers general-purpose on DRM 83724.3 DVD 83624.2.5 DVB 83224.2.4.4 systems scrambling hybrid on Attacks 83024.2.4.3 techniques scrambling Video 82924.2.4.2 architecture system Typical 82824.2.4.1 pay-TV and Video 82724.2.4 music and Books 82324.2.3 culture? free software, Free 81724.2.2 Software 81724.2.1 Copyright 81524.2 Introduction 81524.1 DRM and Copyright 24 813Chapter reading 813Further problems 812Research Summary 81123.9 Doctrine 80923.8.4 stability political and elections on Attacks 80823.8.3 infrastructure other on Attacks 80523.8.2 systems control on Attacks 80323.8.1 warfare Information 80223.8 weapons energy Directed 80023.7 devices explosive Improvised 79723.6 systems IFF 79623.5 issues multisensor and sensors Other 79523.4.4 countermeasures and radars Advanced 79323.4.3 techniques Jamming 79223.4.2 radar of Types 79123.4.1 acquisition target and Surveillance 79023.4 uses military and civil between Interaction 78923.3.4 resistance jam and covertness Combining 78823.3.3.4 communications Burst 78723.3.3.3 DSSS 78623.3.3.2 hopping Frequency 78523.3.3.1 techniques Protection 78423.3.3 communications on Attacks 78123.3.2 techniques intelligence Signals 77923.3.1 systems Communications 77823.3 Basics 77723.2 Introduction 77723.1 Warfare Information and Electronic 23 776Chapter reading 776Further problems 775Research Summary 77422.5 issues Cross-cutting 77022.4.3 ecosystem app Apple's 77022.4.2 apps Pre-installed 76822.4.1.6 services third-party and Ads 76722.4.1.5 malware Android 76622.4.1.4 Permissions 76422.4.1.3 implementations Android Bad 76422.4.1.2 developers and markets App 76322.4.1.1 ecosystem app Android The 76122.4.1 security Platform 76022.4 failings MNO General 75822.3.5 beyond and 5G 75722.3.4 4G 75522.3.3 3G 75122.3.2 GSM 75022.3.1 mobile Going 74922.3 telecomms of economics Security 74822.2.8 companies phone by Frauds 74722.2.7 VOIP 74622.2.6 interaction Feature 74522.2.5 systems end Insecure 74322.2.4 configuration and switching on Attacks 74222.2.3 signaling on Attacks 73922.2.2 metering phone-call on Attacks 73822.2.1 networks phone on Attacks 73722.2 Introduction 73722.1 Phones 22 735Chapter reading 734Further problems 734Research Summary 73321.8 Topology 73021.7 PKI and CAs 72921.6 VPNs 72921.5.2.4 HomePlug 72821.5.2.3 Bluetooth 72721.5.2.2 WiFi 72721.5.2.1 periphery the at networking Wireless 72621.5.2 SSH 72521.5.1 boundary ragged the Cryptography: 72421.5 attacks network detecting problems Specific 72421.4.2.3 detection intrusion of limitations General 72221.4.2.2 detection intrusion of Types 72221.4.2.1 detection Intrusion 72021.4.2 Architecture 71921.4.1.5 filtering egress versus Ingress 71921.4.1.4 proxies Application 71821.4.1.3 gateways Circuit 71821.4.1.2 filtering Packet 71721.4.1.1 wiretaps and censorware firewalls, Filtering: 71521.4.1 attack network against Defense 71421.4 Countermeasures 71321.3.5 works malware How 71121.3.4 evolution malware Further 71021.3.3 worm Internet The 70921.3.2 malware of history Early 70821.3.1 RATs and worms Trojans, - menagerie malware The 70621.3 spammers to spies from - Email 70621.2.6 attacks denial-of-service Other 70521.2.5 amplifiers Other 70421.2.4 reflection SYN and floods SYN TCP, UDP, 70321.2.3 security DNS 70121.2.2 security BGP 70121.2.1 denial service and protocols Network 69921.2 Introduction 69921.1 Defence and Attack Network 21 698Chapter reading 698Further problems 696Research Summary 69520.9 failed that dreams Crypto 69520.8 blockchains Permissioned 69220.7.6 regulation and cryptocrime Exchanges, 69120.7.5 mechanisms payment Off-chain 68920.7.4 contracts Smart 68920.7.3 Miners 68820.7.2 Wallets 68520.7.1 Blockchains 68220.7 Enclaves 68120.6 risks HSM Managing 68120.5.6 clouds and CAs in HSMs the Hacking 68120.5.5 attack EMV The 67920.5.4 attacks protocol Differential 67820.5.3 tradeoffs time-memory and compatibility backwards using Attacks 67720.5.2 attack xor-to-null-key The 67720.5.1 HSMs 67420.5 Tor 67020.4 Signal 66820.3 encryption Full-disk 66720.2 Introduction 66720.1 Engineering Cryptographic Advanced 20 664Chapter reading 664Further problems 663Research Summary 66319.7 channels side Social 66119.6 side-channels Other 66119.5.3 channels side Optical 65919.5.2 channels side Acoustic 65919.5.1 channels side Environmental 65719.5 channels side enclave other and Spectre Meltdown, 65619.4.5 Plundervolt and CLKscrew Rowhammer, 65519.4.4 analysis fault differential and Glitching 65219.4.3 analysis Power 65119.4.2 analysis Timing 65019.4.1 computers within and between Attacks 64919.4 wrong goes What 64519.3.3 signals RF through Leakage 64519.3.2 cables signal and power through Leakage 64519.3.1 attacks Passive 64219.3 countermeasures and surveillance Technical 64119.2.2 History 64019.2.1 security Emission 63919.2 Introduction 63919.1 Channels Side 19 636Chapter reading 636Further problems 636Research Summary 63418.8 protect? one should what So 63318.7 environments Changing 63218.6.5 Security-by-obscurity 63218.6.4 games evaluation and dumping risk market, lemons The 63118.6.3 Conflicts 63018.6.2 problem interface trusted The 63018.6.1 risk residual The 62818.6 art the of state The 62418.5.6 chips Larger 62118.5.5 PUFs and generators number Random 61118.5.4 evolution Security 61018.5.3 Architecture 60918.5.2 History 60918.5.1 chips security other and Smartcards 60718.5 Evaluation 60118.4 modules security Hardware 60118.3 History 59918.2 Introduction 59918.1 Resistance Tamper 18 597Chapter reading 597Further problems 596Research Summary 59317.9 wrong goes What 59117.8 systems Other 59017.7 morphing and recognition Voice 58817.6 codes Iris 58417.5 forensics scene Crime 58117.4.2 claims identity negative or positive Verifying 57917.4.1 Fingerprints 57517.4 recognition Face 57217.3 signatures Handwritten 57117.2 Introduction 57117.1 Biometrics 17 570Chapter reading 569Further problems 569Research Summary 56716.7 methodology Evaluation 56616.6 inspection of nature and cost The 56516.5.6 things right the protecting Not 56416.5.5 control Materials 56416.5.4 failure random of effect The 56316.5.3 measures Anti-gundecking 56216.5.2 model threat the of Peculiarities 56016.5.1 vulnerabilities Systemic 55916.5 mailers PIN 55816.4.3 glue of problems The 55816.4.2 properties Substrate 55716.4.1 seals and Packaging 55316.4 techniques printing Security 55216.3.2 model Threat 55116.3.1 printing Security 55016.3 History 54916.2 Introduction 54916.1 Seals and Printing Security 16 546Chapter reading 546Further problems 545Research Summary 54415.9 openness? or Secrecy 54315.8 failures Technical 54215.7.3 cyberwar with Interaction 54115.7.2 accidents Nuclear 54115.7.1 wrong goes What 54015.7 verification Treaty 53815.6 PALs and resistance Tamper 53615.5 schemes control Shared 53415.4 authentication secure Unconditionally 53415.3 intent environment, Authorization, 53215.2.2 memorandum Kennedy The 53215.2.1 control and command of evolution The 52915.2 Introduction 52915.1 Control and Command Nuclear 15 527Chapter reading 527Further problems 526Research Summary 52214.6 meters Postage 51914.5 policeman as GPS tags: Curfew 51814.4 tachographs smart - generation fourth The 51814.3.5 devices third-generation and defeats Sensor 51614.3.4 problems Other 51514.3.3.2 problems System-level 51414.3.3.1 tachographs Digital 51314.3.3 attacks High-tech 51214.3.2.4 instrument the with Tampering 51214.3.2.3 supply the with Tampering 51114.3.2.2 done is manipulation tachograph most How 51114.3.2.1 wrong goes What 50914.3.2 tachograph The 50914.3.1 limiters speed truck and tachographs meters, Taxi 50814.3 fraud Ticketing 50414.2.5 grids smart and meters Smart 50214.2.4 wrong goes What 50114.2.3 works system STS the How 49914.2.2 metering Utility 49814.2.1 tokens Prepayment 49714.2 Introduction 49714.1 Metering and Monitoring 14 495Chapter reading 495Further problems 494Research Summary 49313.4 learned Lessons 48913.3.5 communications on Attacks 48813.3.4 interactions Feature 48613.3.3 defeats Sensor 48513.3.2 painting a protect to not How 48413.3.1 Alarms 48213.3 locks Electronic 47813.2.5 locks Mechanical 47613.2.4 barriers and Walls 47413.2.3 Deterrence 47313.2.2 model Threat 47213.2.1 barriers and Threats 47113.2 Introduction 47113.1 Alarms and Locks 13 468Chapter reading 466Further problems 466Research Summary 46512.9 banking open and Sofort, 46412.8.3 systems payment phone Other 46312.8.2 M-Pesa 46312.8.1 payments Nonbank 46212.8 fraud payment push Authorised 46112.7.6 Liability 45912.7.5 factors second as Phones 45912.7.4 malware Banking 45812.7.3 CAP 45712.7.2 Phishing 45712.7.1 banking Online 45412.7 Contactless 45212.6.3 attack preplay The 45112.6.2 attack No-PIN The 45012.6.1.3 CDA and DDA ICVVs, 44612.6.1.2 authentication data Static 44512.6.1.1 cards Chip 44512.6.1 cards payment EMV 44412.6 engines Fraud 44312.5.4 3DS 44012.5.3 fraud card Online 43912.5.2 fraud card Credit 43812.5.1 cards Credit 43712.5 injustices and Incentives 43312.4.3 wrong goes What 43012.4.2 basics ATM 43012.4.1 machines teller Automatic 42712.4 wrong goes What 42512.3.3 SWIFT 42412.3.2 E-commerce of history telegraphic A 42412.3.1 systems payment Interbank 42212.3 spots weak the Finding 42112.2.7 governance corporate and tuning Control 42012.2.6.4 validity Ecological 41912.2.6.3 failures Other 41812.2.6.2 case office post The 41612.2.6.1 frauds Executive 41512.2.6 frauds Insider 41112.2.5 controls internal Designing 41012.2.4 model policy security Clark-Wilson The 40812.2.3 banks in Bookkeeping 40812.2.2 bookkeeping Double-entry 40612.2.1 systems Bookkeeping 40512.2 Introduction 40512.1 Bookkeeping and Banking 12 402Chapter reading 402Further problems 401Research Summary 40011.5 side dark The 39911.4.4 Alternatives 39811.4.3 Incentives 39511.4.2 problems its and anonymity Tactical 39411.4.1 gap? the Mind 39211.4 privacy Differential 38911.3 social and location wave: fourth The 38811.2.6 search and preferences wave: third The 38511.2.5 data medical rich in control Inference 38411.2.4 attacks Active 38311.2.3 security statistical classical of Limits 38211.2.2 Randomization 38111.2.1.6 controls query sophisticated More 38011.2.1.5 mechanisms control disclosure statistical Other 37911.2.1.4 suppression Cell 37911.2.1.3 Trackers 37811.2.1.2 control size set Query 37811.2.1.1 control inference of theory basic The 37711.2.1 control inference of history early The 37511.2 Introduction 37511.1 Control Inference 11 373Chapter reading 372Further problems 371Research Summary 36910.5 Wall Chinese The 36710.4.8 education and care Social 36510.4.7 Ethics 36210.4.6 future the - Confidentiality 35910.4.5 uses Secondary 35910.4.4.3 Resilience 35810.4.4.2 care Emergency 35710.4.4.1 wrong goes actually What 35610.4.4 steps practical First 35310.4.3 policy security BMA The 35110.4.2 model threat The 34910.4.1 privacy record Health 34610.4 tigers for Privacy 34410.3 model lattice the and Compartmentation 34110.2 Introduction 34110.1 Boundaries 10 339Chapter reading 338Further problems 337Research Summary 3359.7 MLS with problems Practical 3349.6.6 Polyinstantiation 3339.6.5 malware from threat The 3339.6.4 channels Covert 3329.6.3 problem cascade The 3319.6.2 Composability 3319.6.1 wrong goes What 3309.6 systems Embedded 3309.5.3 SELinux 3299.5.2 Windows 3299.5.1 integrity and IFC to MLS from MAC: 3279.5 diodes Data 3269.4.2 SCOMP 3269.4.1 systems MLS of examples Historical 3259.4 model Biba The 3239.3.5 policies MLS of evolution The 3219.3.4 Bell-LaPadula of criticisms standard The 3209.3.3 model Bell-LaPadula The 3199.3.2 report Anderson The 3189.3.1 policy security Multilevel 3169.3 model? policy security a is What 3159.2 Introduction 3159.1 Security Multilevel 9 IIChapter 311Part reading 311Further problems 310Research Summary 3088.7 cybercrime of Economics 3078.6.9 behaviour human and Organisations 3058.6.8 privacy of Economics 3048.6.7 guards motivated Perversely 3028.6.6 policy competition and law Antitrust 3008.6.5 DRM and tying lock-in, of economics The 2988.6.4 defence and attack of models Structural 2968.6.3 cycle patching the Managing 2948.6.2 insecure? so Windows is Why 2938.6.1 dependability and security of economics The 2918.6 theory Auction 2888.5 games evolutionary and Repeated 2878.4.2 dilemma prisoners' The 2868.4.1 theory Game 2858.4 goods Public 2848.3.4 information Asymmetric 2828.3.3 lock-in of value The 2818.3.2 different are markets information Why 2818.3.1 economics Information 2788.3 Monopoly 2768.2.1 economics Classical 2758.2 Introduction 2758.1 Economics 8 273Chapter reading 272Further problems 271Research Summary 2707.5 name of Types 2697.4.3 names of use the on Restrictions 2697.4.2.6 addresses and names of Stability 2687.4.2.5 names of Uniqueness 2677.4.2.4 names of content Semantic 2657.4.2.3 assumptions Cultural 2647.4.2.2 identity and Naming 2637.4.2.1 wrong goes else What 2607.4.2 principles naming Needham The 2597.4.1 Naming 2577.4 attacks Service-denial 2557.3.4 redundancy? the is level what At 2547.3.3 for? resilience is What 2537.3.2 tolerance fault with Interaction 2527.3.1.2 failure Byzantine 2527.3.1.1 models Failure 2517.3.1 recovery failure and tolerance Fault 2507.3 time Secure 2497.2.6 state Non-convergent 2487.2.5 Deadlock 2477.2.4 updates of order The 2467.2.3 updates inconsistent prevent to Locking 2457.2.2 state propagate to paying versus data old Using 2447.2.1 Concurrency 2437.2 Introduction 2437.1 Systems Distributed 7 240Chapter reading 240Further problems 239Research Summary 2386.5 creep Environmental 2376.4.5 Remedies 2366.4.4 failures interface User 2346.4.3 attacks technical Other 2326.4.2 stack the Smashing 2316.4.1 wrong goes What 2306.4 processors Arm 2286.3.2 processors Intel 2276.3.1 protection Hardware 2256.3 Virtualisation 2246.2.12 Sandboxing 2236.2.11 Browsers 2226.2.10.2 controls access Database 2226.2.10.1 Middleware 2196.2.10 Windows 2186.2.9 Android 2176.2.8 iOS 2176.2.7 macOS Apple's 2156.2.6 MAC and DAC 2146.2.5 Capabilities 2126.2.4 security system operating Unix 2116.2.3 lists control Access 2106.2.2 roles and Groups 2096.2.1 controls access system Operating 2076.2 Introduction 2076.1 Control Access 6 204Chapter reading 204Further problems 203Research Summary 2025.8 wrong goes else What 2005.7.9 primitives? cryptographic asymmetric are strong How 1995.7.8 primitives Special-purpose 1995.7.7 QUIC 1985.7.6.3 PGP/GPG 1975.7.6.2 signing Code 1975.7.6.1 protocols public-key Other 1975.7.6 1.3 TLS 1965.7.5.3 security TLS 1965.7.5.2 uses TLS 1955.7.5.1 TLS 1945.7.5 authorities Certification 1935.7.4 cryptography curve Elliptic 1925.7.3 DSA and signature digital ElGamal 1905.7.2.3 establishment key Diffie-Hellman 1895.7.2.2 encryption commutative One-way 1885.7.2.1 logarithms discrete on based Cryptography 1855.7.2 factoring on based Cryptography 1855.7.1 primitives crypto Asymmetric 1835.7 updating and commitments HMAC, - applications function Hash 1815.6.2 functions hash Common 1815.6.1 functions Hash 1805.6 XTS 1805.5.7 mode counter Galois 1795.5.6 code authentication Message 1785.5.5 modes cipher stream Legacy 1785.5.4 encryption Counter 1775.5.3 chaining block Cipher 1765.5.2 cipher block a use to not How 1755.5.1 operation of Modes 1735.5 DES 1735.4.3.2 result Luby-Rackoff The 1715.4.3.1 ciphers Feistel 1695.4.3 (AES) Standard Encryption Advanced The 1685.4.2 cryptanalysis Differential 1675.4.1.5 cryptanalysis Linear 1675.4.1.4 S-boxes of Choice 1665.4.1.3 rounds of Number 1665.4.1.2 size Block 1655.4.1.1 SP-networks 1655.4.1 algorithms crypto Symmetric 1645.4 signatures Digital 1635.3.5 permutations one-way trapdoor and encryption key Public 1615.3.4 ciphers block - permutations Random 1595.3.3 ciphers stream - generators Random 1585.3.2 theorem birthday The 1575.3.1.2 Properties 1575.3.1.1 functions hash - functions Random 1555.3.1 models Security 1545.3 primitives Asymmetric 1525.2.5 functions Hash 1505.2.4 Playfair - cipher block early An 1485.2.3 pad one-time The 1475.2.2 Vigenère the - cipher stream early An 1465.2.1 background Historical 1455.2 Introduction 1455.1 Cryptography 5 144Chapter reading 143Further problems 143Research Summary 1414.9 assurance Design 1414.8 management key Practical 1394.7.5 Kerberos 1384.7.4 protocol Needham-Schroeder The 1374.7.3 management key Remote 1374.7.2 duckling resurrecting The 1364.7.1 keys encryption Managing 1354.7 attacks protocol Chosen 1344.6 environment the Changing 1334.5 message the Manipulating 1324.4 attacks Reflection 1294.3.4 attack MIG-in-the-middle The 1284.3.3 authentication Two-factor 1244.3.2 response and Challenge 1224.3.1 authentication simple - there? goes Who 1204.3 risks eavesdropping Password 1194.2 Introduction 1194.1 Protocols 4 118Chapter reading 117Further problems 116Research Summary 1153.6 CAPTCHAs 1133.5 passwords? of rid get ever we Will 1113.4.12 manager password a Using 1103.4.11 limits Absolute 1093.4.10 checking password Remote 1093.4.9.3 cracking Password 1093.4.9.2 encryption One-way 1083.4.9.1 storage password on Attacks 1073.4.9 counters retry password of defeats Technical 1073.4.8.3 terminals bogus and path, Trusted 1063.4.8.2 design Interface 1063.4.8.1 entry password on Attacks 1053.4.8 others? or oneself Protecting 1053.4.7 service? deny you Can 1043.4.6 issues System 1033.4.5 warnings Phishing 1023.4.4.7 education Customer 1013.4.4.6 attacks Social-engineering 1003.4.4.5 failures Operational 983.4.4.4 errors Design 963.4.4.3 training and abilities User 963.4.4.2 choice Naïve 953.4.4.1 password the remembering with Difficulties 943.4.4 entry password reliable with Difficulties 943.4.3 choice Password 923.4.2 recovery Password 903.4.1 Passwords 893.4 research Deception 883.3.5 Opsec 863.3.4 Phishing 843.3.3 engineering Social 823.3.2 scamster the and salesman The 813.3.1 practice in Deception 813.3 thermostat risk The 813.2.5.7 dissonance Cognitive 803.2.5.6 heuristic affect The 793.2.5.5 intentionality to default The 793.2.5.4 nudges and Defaults 783.2.5.3 discounting hyperbolic and bias Present 773.2.5.2 misperception risk and theory Prospect 763.2.5.1 economics behavioural and biases Heuristics, 733.2.5 deception of theory social-brain The 723.2.4 effect bystander The 713.2.3.2 abuse its and Authority 703.2.3.1 psychology Social 683.2.3 variation interpersonal and diversity Gender, 653.2.2 psychology Cognitive 643.2.1 research psychology from Insights 633.2 Introduction 633.1 Usability and Psychology 3 61Chapter reading 60Further problems 59Research Summary 572.6 abuse relationship Intimate 572.5.4 bullying workplace and School 552.5.3 material abuse sex Child 542.5.2 campaigns hate and Hacktivism 532.5.1 swamp The 522.5 Geeks 502.4 Whistleblowers 492.3.6 crimes CEO 492.3.5 attacks Internal 492.3.4 ecosystems cybercrime Sectoral 472.3.3 systems payment and banking on Attacks 472.3.2 Ransomware 462.3.1.7 gangs Cashout 462.3.1.6 attackers Targeted 452.3.1.5 compromise account Bulk 452.3.1.4 senders Spam 442.3.1.3 devs Malware 422.3.1.2 herders Botnet 422.3.1.1 infrastructure Criminal 412.3.1 Crooks 402.3 Attribution 382.2.5 rest The 352.2.4 Russia 302.2.3 China 292.2.2 scaling Attack 282.2.1.12 operations Offensive 272.2.1.11 viewpoint analyst's The 252.2.1.10 CNE 252.2.1.9 Quantum 242.2.1.8 Longhaul 232.2.1.7 Xkeyscore 222.2.1.6 Edgehill and Bullrun 222.2.1.5 collection Special 212.2.1.4 Muscular 202.2.1.3 Tempora 192.2.1.2 Prism 192.2.1.1 Eyes Five The 192.2.1 Spies 172.2 Introduction 172.1 Opponent? the Is Who 2 16Chapter Summary 111.8 Definitions 101.7 home the - 4 Example 81.6 hospital a - 3 Example 71.5 base military a - 2 Example 61.4 bank a - 1 Example 41.3 framework A 31.2 Introduction 31.1 Engineering? Security Is What 1 IChapter xlixPart xlviiForeword lawyers... other and daughter, xliiiFormy Edition First the to xliPreface Edition Second the to xxxviiPreface Edition Third the to Preface Gestaffelte Versandkosten werden für differente Gewichtsklassen sowie für bestimmte Zielgebiete erfasst Tiefpreis die aufgrund des Gewichts der bestellten Waren zustandekommen Was ist eCommerce? Ladentresen
Verwirrt? Link zum original Text
EAN: | 9781119642787 |
Marke: | Wiley Sons,Wiley |
weitere Infos: | MPN: 87267543 |
im Moment nicht an Lager | |
Online Shop: | eUniverse |
Berichten Sie über das Produkt
Harden your business against internal and external cybersecurity threats with a single accessible resource.In 8 Steps to Better Security:...
Berichten Sie über das Produkt
This value-packed set for the serious (ISC)2 CCSP certification candidate combines the bestselling CCSP (ISC)² Certified Cloud Security...
Berichten Sie über das Produkt
Preface1 The Building Site2 The Building3 Foundation Systems4 Floor Systems5 Wall Systems6 Roof Systems7 Moisture & Thermal Protection8...