0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R1,491 Discovery Miles 14 910 Ships in 12 - 19 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R3,290 Discovery Miles 32 900 Ships in 12 - 19 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Billionaires Under Construction - The…
DJ Sbu Paperback  (9)
R165 R148 Discovery Miles 1 480
The Law Of Business Structures
Paperback R1,218 R1,055 Discovery Miles 10 550
Trust & Inspire - How Truly Great…
Stephen M.R. Covey Paperback R440 R393 Discovery Miles 3 930
Cultureneering
Ian Fuhr Paperback R310 R281 Discovery Miles 2 810
Skool vir Talente 3: Derde Periode…
Silke Schellhammer Paperback R225 R211 Discovery Miles 2 110
Thin Films on Glass
Hans Bach, Dieter Krause Hardcover R5,671 Discovery Miles 56 710
The Swim Team
Catherine Jarvis Paperback R275 R258 Discovery Miles 2 580
Biocompatible Glasses - From Bone…
Juliana Marchi Hardcover R5,046 Discovery Miles 50 460
Grace & Mercy - A Devotional Journey
Kathleen E Yancosek, Chris Dillashaw Hardcover R733 R650 Discovery Miles 6 500
The Alphabet of Grace
Frederick Buechner Paperback R392 R359 Discovery Miles 3 590

 

Partners