Security and Usability: Designing Secure Systems that People Can Use Ebook

,
Publication: O'Reilly Media
 
Is my Device Supported?


Sorry, this ebook is not available for sale. Please take a look at other works by author, or good alternatives from the same category.

Description

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues—both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

But there is a growing recognition that today’s security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world’s future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users.

Still, many people believe there is an inherent tradeoff between computer security and usability. It’s true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can’t use one that’s secure, they’ll use one that isn’t. Unfortunately, unsecured systems aren’t usable for long, either. They get hacked, compromised, and otherwise rendered useless.

There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computerinteraction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research.

Security & Usability groups 34 essays into six parts:

  • Realigning Usability and Security—-with careful attention to user-centered design principles, security and usability can be synergistic.
  • Authentication Mechanisms— techniques for identifying and authenticating computer users.
  • Secure Systems—how system software can deliver or destroy a secure user experience.
  • Privacy and Anonymity Systems—methods for allowing people to control the release of personal information.
  • Commercializing Usability: The Vendor Perspective—specific experiences of security and software vendors (e.g.,IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability.
  • The Classics—groundbreaking papers that sparked the field of security and usability.

This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.

Should you buy this Ebook?

We've put together a collection of resources to help you make a decision regarding whether you should buy this Ebook from us.

  1. Is your device one of these? Ebook reading software will work on the following devices: Windows, Mac, Android 2.2+ Devices, IPad (iOS 3+), IPhone (iOS 3+), Kindle Fire. Several other devices are also supported by the software.
  2. Compare prices. Our price is $34.90. If you would like to research our competitors to see their prices. Here're some places to look:
  3. Why should you buy Ebooks from onlinebookplace.com?

    We've had 1000s of downloads so far and with over 300000+ Ebooks to choose from, onlinebookplace.com is becoming a favorite Ebook Store for many. Allow us to win you over with our competitive pricing, upfront policies and diligent customer service.

    We're Upfront:

    • Every Ebook page on onlinebookplace.com has information on restrictions that publishers have placed on the Ebook along with a clear indication of software required to read the Ebooks.
    • If ratings for an Ebook are available from one of several sources online, then we've attempted to get those to help you make a better purchasing decision about the Ebook. Reviews from Goodreads (a popular reviews site) are provided on the same if they're available.
    • In most cases, we've also attempted to get you links to the Ebook on our competitor's site so that you can compare prices with relative ease.
    • We use McAfee to scan for any vulnerabilities in the system to ensure that any information that you give us does not fall into the wrong hands.
    • We use Paypal, a trusted 3rd party payment provider to accept Payments -- your payment information doen't reside with us. Any information that does end up with us is safe.

Check below for device compatibility and any free 3rd-party software requirements. Choice of what ebook reading app to use is yours, we only present a few common apps that several customers of ours have preferred. You should be able to transfer your purchase to more than one (upto 6) compatible devices as long as your ebook-reading apps have been registered with the same Adobe ID before opening the file.

Computers/laptops/Mac

Windows/Mac PC or Laptop

Free app Adobe Reader required.

Android

Android 2.1+

Most Android devices already have ability to open this format. In case your hardware doesn't, then Adobe Reader may need to be installed.

Kindle Fire (and any Android based Kindle models)

Kindle Should be able to open this format natively.

IPhone/IPad

IPad or IPhone

Most iPhone/iPad devices may already have ability to open this format. In case your hardware doesn't, then Adobe Reader may need to be installed.

Other E-Reader

Several Other devices supported

Most iPhone/iPad devices may already have ability to open PDF or EPub this format. Please refer to your device's documentation to ensure that there is support.

Security and Usability: Designing Secure Systems that People Can Use