0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R1,384 Discovery Miles 13 840 Ships in 12 - 17 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Hardcover)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R3,058 Discovery Miles 30 580 Ships in 12 - 17 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Finally Enough Love - #1's Remixed
Madonna CD  (2)
R403 Discovery Miles 4 030
Cable Guys Controller and Smartphone…
R399 R359 Discovery Miles 3 590
Bostik Clear on Blister Card (25ml)
R38 Discovery Miles 380
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
BSwish Bwild Classic Marine Vibrator…
R779 R649 Discovery Miles 6 490
The Personal History Of David…
Dev Patel, Peter Capaldi, … DVD  (1)
R63 Discovery Miles 630
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Cadac Pizza Stone (33cm)
 (18)
R398 Discovery Miles 3 980

 

Partners