114,47 €
127,19 €
-10% with code: EXTRA
Integrating a Usable Security Protocol Into User Authentication Services Design Process
Integrating a Usable Security Protocol Into User Authentication Services Design Process
114,47
127,19 €
  • We will send in 10–14 business days.
There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate.…
  • SAVE -10% with code: EXTRA

Integrating a Usable Security Protocol Into User Authentication Services Design Process (e-book) (used book) | bookbook.eu

Reviews

Description

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

EXTRA 10 % discount with code: EXTRA

114,47
127,19 €
We will send in 10–14 business days.

The promotion ends in 20d.11:07:56

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,27 Book Euros!?

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)