Archbishop Kiwanuka Memorial Library Catalogue
Image from Google Jackets
Image from Coce

Behavioral cybersecurity : Applications of personality psychology and computer science / Wayne Patterson, Cynthia E. Winston-Proctor.

By: Contributor(s): Material type: TextTextPublisher: Boca Raton ; New York : CRC Press/Taylor & Francis Group, c2019Description: xxviii, 261 pages : illustrations ; 25 cmISBN:
  • 9781138617780
Subject(s): DDC classification:
  • 005.8 23 PAT
Contents:
Table of Contents. - Ch. 1 Cybersecurity. - Ch. 2 Essentials of Behavioral science. - Ch. 3 Psychology and cybersecurity. - Ch. 4 Recent events. - Ch. 5 Profiling. - Ch. 6 Hack lab: social engineering practice. - Ch. 7 Access control. - Ch. 8 The first step: Authorization. - Ch. 9 Hack lab 2: Assigned passwords in the clear. - Ch. 10 Origins of cryptography. - Ch. 11 Hack lab 3: Sweeney method. - Ch. 12 Hacker personalities: case studies. - Ch. 13 Game theory. - Ch. 14 Ethical hacking. - Ch. 15 The psychology of gender. - Ch. 16 Turing tests. - Ch. 17 Personality tests, methods, and Assessment. - Ch. 18 Modular Arithmetic and other computational methods. - Ch. 19 Modern cryptography. - Ch. 20 Steganography. - Ch. 21 Using Cryptography and Steganography in Tandem or in sequence. - Ch. 22 A Metric to assess cyberattacks. - Ch. 23 Behavioral economics. - Ch. 24 Fake News. - Ch. 25 Potpourri. - Ch. 26 Hack Lab 4: Contradictions in password meters. - Ch. 27 Conclusion.
Item type: Book
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Current library Call number Status Date due Barcode
UMU Fort Portal Campus 005.8 PAT (Browse shelf(Opens below)) Available 52128

Includes bibliographical references and index.

Table of Contents. - Ch. 1 Cybersecurity. - Ch. 2 Essentials of Behavioral science. - Ch. 3 Psychology and cybersecurity. - Ch. 4 Recent events. - Ch. 5 Profiling. - Ch. 6 Hack lab: social engineering practice. - Ch. 7 Access control. - Ch. 8 The first step: Authorization. - Ch. 9 Hack lab 2: Assigned passwords in the clear. - Ch. 10 Origins of cryptography. - Ch. 11 Hack lab 3: Sweeney method. - Ch. 12 Hacker personalities: case studies. - Ch. 13 Game theory. - Ch. 14 Ethical hacking. - Ch. 15 The psychology of gender. - Ch. 16 Turing tests. - Ch. 17 Personality tests, methods, and Assessment. - Ch. 18 Modular Arithmetic and other computational methods. - Ch. 19 Modern cryptography. - Ch. 20 Steganography. - Ch. 21 Using Cryptography and Steganography in Tandem or in sequence. - Ch. 22 A Metric to assess cyberattacks. - Ch. 23 Behavioral economics. - Ch. 24 Fake News. - Ch. 25 Potpourri. - Ch. 26 Hack Lab 4: Contradictions in password meters. - Ch. 27 Conclusion.

There are no comments on this title.

to post a comment.

Archbishop Kiwanuka Memorial Library | Uganda Martyrs University P.O. Box : 5498 Kampala, Uganda
Tel : +256-(0) 382-277-901 or +256-(0) 382-410-611 / E-mail : library@umu.ac.ug