Browse Results What Download Format Should I Choose?

Showing 1 through 2 of 2 results

Peer to Peer

by Rael Dornfest David Anderson Nimisha Asthagiri Dan Brickley Dan Bricklin Alan Brown Avinash Chugh Lorrie Cranor Roger Dingledine Michael Freedman Marc Hedlund Theodore Hong Gene Kan Adam Langley Richard Lethin Jeremie Miller Nelson Minar David Molnar Tim O'Reilly Aviel Rubin Clay Shirky Walter Tuvell Jon Udell Marc Waldman Brandon Wiley

This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found. The contributors are leading developers of well-known peer-to-peer systems, such as Gnutella, Freenet, Jabber, Popular Power, SETI@Home, Red Rover, Publius, Free Haven, Groove Networks, and Reputation Technologies. Topics include metadata, performance, trust, resource allocation, reputation, security, and gateways between systems.

Security and Usability

by Simson Garfinkel Lorrie Cranor

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users. Still, many people believe there is an inherent trade-off between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless. There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security and Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computer interaction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research. Security and Usability groups 34 essays into six parts: Realigning Usability and Security-- with careful attention to user-centered design principles, security and usability can be synergistic. Authentication Mechanisms-- techniques for identifying and authenticating computer users. Secure Systems-- how system software can deliver or destroy a secure user experience. Privacy and Anonymity Systems-- methods for allowing people to control the release of personal information. Commercializing Usability: The Vendor Perspective-- specific experiences of security and software vendors (e.g., IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability. The Classics-- groundbreaking papers that sparked the field of security and usability. This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.

Showing 1 through 2 of 2 results

Help

Select your download format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. For more details, visit the Formats page under the Getting Started tab.

See and hear words read aloud
  • DAISY Text - See words on the screen and hear words being read aloud with the text-to-speech voice installed on your reading tool. Navigate by page, chapter, section, and more. Can also be used in audio-only mode. Compatible with many reading tools, including Bookshare’s free reading tools.
  • DAISY Text with Images - Similar to DAISY Text with the addition of images within the Text. Your reading tool must support images.
  • Read Now with Bookshare Web Reader - Read and see images directly from your Internet browser without downloading! Text-to-speech voicing and word highlighting are available on Google Chrome (extension installation required). Other browsers can be used with limited features. Learn more
Listen to books with audio only
  • DAISY Audio - Listen to books in audio-only mode with the high-quality Kendra voice by Ivona pre-installed. Navigate by page, chapter, section, and more. Must be used with a DAISY Audio compatible reading tool.
  • MP3 - Listen to books in audio-only mode with the high-quality Kendra voice by Ivona pre-installed. Navigate using tracks. Can be used with any MP3 player.
Read in Braille
  • BRF (Braille Ready Format) - Read with any BRF compatible refreshable braille display; navigate using the search or find feature.
  • DAISY Text - Read with any DAISY 3.0 compatible refreshable braille display, navigate by page, chapter, section, and more.
  • Embossed Braille - Use Bookshare’s DAISY Text or BRF formats to generate embossed braille.