Human-Centered Security Audiolibro Por Heidi Trost, Adam Shostack - foreword arte de portada

Human-Centered Security

How to Design Systems That Are Both Safe and Usable

Vista previa

Prueba gratis de 30 días de Audible Standard

Prueba Standard gratis
Selecciona 1 audiolibro al mes de nuestra colección completa de más de 1 millón de títulos.
Es tuyo mientras seas miembro.
Obtén acceso ilimitado a los podcasts con mayor demanda.
Plan Standard se renueva automáticamente por $8.99 al mes después de 30 días. Cancela en cualquier momento.

Human-Centered Security

De: Heidi Trost, Adam Shostack - foreword
Narrado por: Simran Singh
Prueba Standard gratis

$8.99 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por $15.75

Compra ahora por $15.75

In our interconnected world, we face a complex cybersecurity ecosystem where digital vulnerabilities can have far-reaching consequences. Threats to digital infrastructure often impact critical physical systems, potentially causing real-world harm. With AI agents set to handle extensive personal information, data security and privacy are more crucial than ever.

Human-Centered Security targets professionals designing digital products that handle sensitive data: UX designers, engineers, and product managers. It's also for those responsible for securing organizational data and systems: security engineers, CISOs, CIOs, and teams focused on risk management, legal, privacy, and compliance.

These professionals influence security-related behaviors and possess deep knowledge of threats to their products or organizations. This places a significant responsibility on them to design resilient systems that encourage safer outcomes.

This book will help you focus on areas of the user experience where security impacts users the most; understand the dynamics of the security ecosystem; find your security UX allies; ask better questions when talking to your cross-disciplinary team; and more.

©2024 Heidi Trost (P)2026 Ascent Audio
Programación Seguridad y Cifrado Ciberseguridad Hackeo Administración de riesgos
Todavía no hay opiniones