0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R1,491 Discovery Miles 14 910 Ships in 10 - 15 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R3,379 Discovery Miles 33 790 Ships in 10 - 15 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Value What's Within - Moe & Ollie…
Christine Reynebeau Hardcover R519 R483 Discovery Miles 4 830
Reflection Groups and Invariant Theory
Richard Kane Hardcover R2,260 Discovery Miles 22 600
Crystal Kingdom
Donia Youssef, Bernice Robinson Hardcover R594 Discovery Miles 5 940
Group Theory in Physics
Wu-Ki Tung Hardcover R1,659 Discovery Miles 16 590
A Caterpillar at the Dentist
Shweta Ujaoney, Kelly O' Neill Hardcover R505 R473 Discovery Miles 4 730
Neurology for Babies
Dr Haitham Ahmed Board book R238 R226 Discovery Miles 2 260
Twinkle the Caticorn - Believe in…
Noor Ashmawey Hardcover R359 Discovery Miles 3 590
Consent - Introducing consent and body…
Jayneen Sanders Hardcover R451 Discovery Miles 4 510
Abelian Groups and Representations of…
David Arnold Hardcover R3,492 Discovery Miles 34 920
Geometric and Harmonic Analysis on…
Ali Baklouti, Takaaki Nomura Hardcover R2,671 Discovery Miles 26 710

 

Partners