0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R1,491 Discovery Miles 14 910 Ships in 12 - 19 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R3,290 Discovery Miles 32 900 Ships in 12 - 19 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Captain America
Jack Kirby, Joe Simon, … Paperback R709 R624 Discovery Miles 6 240
A History of Horoscopic Astrology
James Herschel Holden Hardcover R1,332 R1,118 Discovery Miles 11 180
Emerging Trends and Insights on Economic…
Shilpa Deo, A.V. Senthil Kumar Hardcover R5,776 Discovery Miles 57 760
Redefining Recovery from Aphasia
Dalia Cahana-Amitay, Martin Albert Hardcover R3,020 Discovery Miles 30 200
Shamanism for Beginners - Explore…
Silvia Hill Hardcover R631 R569 Discovery Miles 5 690
Disability Informatics and Web…
Georgios Kouroupetroglou Hardcover R5,527 Discovery Miles 55 270
Arcana of Spiritualism - a Manual of…
Hudson Tuttle Paperback R675 Discovery Miles 6 750
Mothers in the Fatherland - Women, the…
Claudia Koonz Hardcover R4,682 Discovery Miles 46 820
The Painters' & Grainers' Handbook - a…
James Callingham Hardcover R865 Discovery Miles 8 650
The City - Urban Churches in the…
David A. Busic Paperback R399 R374 Discovery Miles 3 740

 

Partners