Page de couverture de Human-Centered Security

Human-Centered Security

How to Design Systems That Are Both Safe and Usable

Aperçu

30 jours d'essai gratuit à Audible Standard

Essayez l’abonnement standard gratuitement
Choisissez 1 livre audio par mois dans notre collection contenant plus de 900 000 titres.
Écoutez les livres audio que vous avez sélectionnés tant que vous êtes membre.
Profitez d’un accès illimité à des balados incontournables.
L'abonnement Standard se renouvelle automatiquement au tarif de 8,99 $/mois + taxes applicables après 30 jours. Annulation possible à tout moment.

Human-Centered Security

Auteur(s): Heidi Trost, Adam Shostack - foreword
Narrateur(s): Simran Singh
Essayez l’abonnement standard gratuitement

8,99 $/mois après 30 jours. Annulable en tout temps

Acheter pour 16,44 $

Acheter pour 16,44 $

À propos de cet audio

In our interconnected world, we face a complex cybersecurity ecosystem where digital vulnerabilities can have far-reaching consequences. Threats to digital infrastructure often impact critical physical systems, potentially causing real-world harm. With AI agents set to handle extensive personal information, data security and privacy are more crucial than ever.

Human-Centered Security targets professionals designing digital products that handle sensitive data: UX designers, engineers, and product managers. It's also for those responsible for securing organizational data and systems: security engineers, CISOs, CIOs, and teams focused on risk management, legal, privacy, and compliance.

These professionals influence security-related behaviors and possess deep knowledge of threats to their products or organizations. This places a significant responsibility on them to design resilient systems that encourage safer outcomes.

This book will help you focus on areas of the user experience where security impacts users the most; understand the dynamics of the security ecosystem; find your security UX allies; ask better questions when talking to your cross-disciplinary team; and more.

©2024 Heidi Trost (P)2026 Ascent Audio
Programmation et développement de logiciels Sécurité et chiffrement Cybersécurité Piratage Gestion des risques
Pas encore de commentaire