0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R1,407 Discovery Miles 14 070 Ships in 12 - 17 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R3,109 Discovery Miles 31 090 Ships in 12 - 17 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bostik Clear on Blister Card (25ml)
R38 Discovery Miles 380
Kenwood Steam Iron (2200W)
R519 R437 Discovery Miles 4 370
Grandeur Feather Down Comforter (Queen…
R2,199 R1,279 Discovery Miles 12 790
What Really Happened In Wuhan
Sharri Markson Paperback R300 R240 Discovery Miles 2 400
Peptine Pro Canine/Feline Hydrolysed…
R369 R299 Discovery Miles 2 990
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Call The Midwife - Season 6 - (plus 2016…
Jenny Agutter, Linda Bassett, … DVD  (2)
R235 Discovery Miles 2 350
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Harry Potter Wizard Wand - In…
 (3)
R830 Discovery Miles 8 300

 

Partners