0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R1,491 Discovery Miles 14 910 Ships in 10 - 15 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R3,379 Discovery Miles 33 790 Ships in 10 - 15 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Still Life
Sarah Winman Paperback R363 Discovery Miles 3 630
Evergreen
Buck Turner Paperback  (1)
R270 R246 Discovery Miles 2 460
The Bitterness Of Olives
Andrew Brown Paperback R340 R314 Discovery Miles 3 140
The Nuremberg Military Tribunals and the…
Kevin Jon Heller Hardcover R3,632 Discovery Miles 36 320
The Fork Who Ate Cake
Alyssa Suzanne Hodges Hardcover R515 Discovery Miles 5 150
Tipp-Ex Micro Twist Correction Tape (5mm…
R40 Discovery Miles 400
Kids On Earth - A Children's Documentary…
Sensei Paul David Hardcover R812 Discovery Miles 8 120
Croxley Create Highlighter - Blue…
R20 Discovery Miles 200
The Dirty Secrets Of The Rich And…
James-Brent Styan Paperback R320 R286 Discovery Miles 2 860
An Atlas Of Endangered Alphabets - A…
Tim Brookes Hardcover R778 R726 Discovery Miles 7 260

 

Partners