0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R1,491 Discovery Miles 14 910 Ships in 10 - 15 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R3,379 Discovery Miles 33 790 Ships in 10 - 15 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Maped Advanced Office Scissors (21cm)
 (2)
R96 Discovery Miles 960
Discovering Daniel - Finding Our Hope In…
Amir Tsarfati, Rick Yohn Paperback R280 R258 Discovery Miles 2 580
DeepCool Z5 High Performance Thermal…
 (1)
R76 Discovery Miles 760
Oak Oak Gevora Eau De Parfum Spray…
R1,188 Discovery Miles 11 880
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Wonka
Timothee Chalamet Blu-ray disc R346 R281 Discovery Miles 2 810
ILY: The Pebble
R999 R689 Discovery Miles 6 890
Pritt Glue Stick (43g)
R75 R49 Discovery Miles 490
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Kangaro HDP 1320 1 Hole Heavy Duty Punch
R2,184 R1,642 Discovery Miles 16 420

 

Partners