0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R1,491 Discovery Miles 14 910 Ships in 10 - 15 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R3,379 Discovery Miles 33 790 Ships in 10 - 15 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Love Song Of Andre P. Brink - A…
Leon De Kock Paperback  (1)
R415 Discovery Miles 4 150
The Mavericks - How Coronation, Ninety…
Stephen Cranston Paperback R350 R312 Discovery Miles 3 120
Shackled - One Woman's Dramatic Triumph…
Mariam Ibraheem, Eugene Bach Paperback R406 R385 Discovery Miles 3 850
The People's War - Reflections Of An ANC…
Charles Nqakula Paperback R325 R300 Discovery Miles 3 000
Syd Kitchen - Scars That Shine
Donve Lee Paperback R260 R232 Discovery Miles 2 320
Uncaptured - The True Account Of The…
Mosilo Mothepu Paperback R349 Discovery Miles 3 490
Like Sodium In Water - A Memoir Of Home…
Hayden Eastwood Paperback  (1)
R354 Discovery Miles 3 540
Rocklands - On Becoming The First…
Liezille Jean Jacobs Paperback R300 R277 Discovery Miles 2 770
The Profiler Diaries - From The Case…
Gerard Labuschagne Paperback  (2)
R380 R351 Discovery Miles 3 510
Disciple - Walking With God
Rorisang Thandekiso, Nkhensani Manabe Paperback  (1)
R280 R250 Discovery Miles 2 500

 

Partners