Mobile Authentication (Record no. 44208)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03321nam a22005537a 4500 |
001 - CONTROL NUMBER | |
control field | sulb-eb0022116 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | BD-SySUS |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20160413122224.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 120820s2013 xxu| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781461448785 |
-- | 978-1-4614-4878-5 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-1-4614-4878-5 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | bicssc |
Subject category code | UTN |
Source | bicssc |
Subject category code | COM053000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Jakobsson, Markus. |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Mobile Authentication |
Medium | [electronic resource] : |
Remainder of title | Problems and Solutions / |
Statement of responsibility, etc. | by Markus Jakobsson. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | New York, NY : |
Name of producer, publisher, distributor, manufacturer | Springer New York : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2013. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XIV, 113 p. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
490 1# - SERIES STATEMENT | |
Series statement | SpringerBriefs in Computer Science, |
International Standard Serial Number | 2191-5768 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | The Big Picture -- The Benefits of Understanding Passwords -- Your Password is Your New PIN -- Like Passwords - But Faster, Easier and More Secure -- Improved Visual Preference Authentication -- How to Kill Spoofing -- Can Biometrics Replace Passwords? -- Legacy Servers: Teaching Old Dogs New Tricks. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to follow instructions, or that end users were hopeless and would always make mistakes. The truth, of course, is somewhere in between, which is exactly what makes this topic so enticing. We cannot make progress with human-to-machine authentication without understanding both humans and machines. Mobile security is not simply security ported to a handset. Handsets have different constraints than traditional computers, and are used in a different way. Text entry is more frustrating, and therefore, it is tempting to use shorter and less complex passwords. It is also harder to detect spoofing. We need to design with this in mind. We also need to determine how exactly to integrate biometric readers to reap the maximum benefits from them. This book addresses all of these issues, and more. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer science. |
Topical term or geographic name as entry element | Computer communication systems. |
Topical term or geographic name as entry element | Computer security. |
Topical term or geographic name as entry element | Data structures (Computer science). |
Topical term or geographic name as entry element | Data encryption (Computer science). |
Topical term or geographic name as entry element | Biometrics (Biology). |
Topical term or geographic name as entry element | Computer Science. |
Topical term or geographic name as entry element | Systems and Data Security. |
Topical term or geographic name as entry element | Biometrics. |
Topical term or geographic name as entry element | Computer Communication Networks. |
Topical term or geographic name as entry element | Data Encryption. |
Topical term or geographic name as entry element | Data Structures, Cryptology and Information Theory. |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9781461448778 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | SpringerBriefs in Computer Science, |
International Standard Serial Number | 2191-5768 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a> |
912 ## - | |
-- | ZDB-2-SCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type |
No items available.