0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R1,384 Discovery Miles 13 840 Ships in 12 - 17 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R3,058 Discovery Miles 30 580 Ships in 12 - 17 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Correctional
Ravi Shankar Hardcover R704 R608 Discovery Miles 6 080
The Bad Old Days - A Decade of…
Herbert Rothschild Hardcover R641 Discovery Miles 6 410
Negroes with Guns
Robert F Williams, Martin Luther King, … Hardcover R612 Discovery Miles 6 120
Just Responsibility - A Human Rights…
Brooke A. Ackerly Hardcover R3,395 Discovery Miles 33 950
The Constitution of the United States…
United States Of America Hardcover R426 Discovery Miles 4 260
Advanced Introduction to Children's…
Gamze Erdem Turkelli, Wouter Vandenhole Paperback R605 Discovery Miles 6 050
Law
Robert Spicer Paperback R708 Discovery Miles 7 080
Daddy, Tell Me a Story - The Life and…
Nefertara Clark Hardcover R979 R815 Discovery Miles 8 150
The Freedom to Be Racist? - How the…
Erik Bleich Hardcover R1,971 Discovery Miles 19 710
An Introduction to Fundamental Rights in…
Alessandra Facchi, Silvia Falcetta, … Paperback R861 Discovery Miles 8 610

 

Partners