Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Landay, James A.

laptops, environmental awareness

Lederer, Scott

LightCrypto

Linux v0.4 filesystem, per-files s attribute

list serves, analyzing user feedback in postrelease phase of product development

locations, physical

     exploiting differences

    tracking system

         stalking danger

    tracking systems

         restricting user control

lock icon on browsers, user understanding of

login, keystroke-enhanced

logs

     amount of data in

     HTTP

     network

         command-line analysis tool

     scanning

     sessions

     web

low-fidelity prototyping 2nd 3rd

     testing

low-latency networks

Категории