Integrating a Usable Security Protocol Into User Authentication Services Design Process - Christina Braz

Integrating a Usable Security Protocol Into User Authentication Services Design Process

By: Christina Braz, Ahmed Seffah, Bilal Naqvi

Hardcover | 21 November 2018

At a Glance

Hardcover


RRP $210.00

$150.75

28%OFF

or 4 interest-free payments of $37.69 with

 or 

Available for Backorder. We will order this from our supplier however there isn't a current ETA.

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

More in Data Encryption

Cybercrime : An Encyclopedia of Digital Crime - Nancy E. Marion

RRP $59.99

$49.25

18%
OFF
Blockchain : Blueprint for a New Economy - Melanie Swan

RRP $66.50

$30.75

54%
OFF
Cyber Wars : Hacks that Shocked the Business World - Charles Arthur
Network Security Assessment : Know Your Network : 3rd Edition - Chris Mcnab
The Language of Cyber Attacks : A Rhetoric of Deception - Aaron Mauro
Encyclopedia of Cyber Warfare - Paul J. Springer

RRP $260.00

$183.95

29%
OFF
How to Measure Anything in Cybersecurity Risk - Douglas W. Hubbard

RRP $99.95

$64.50

35%
OFF
Cloud Security For Dummies : For Dummies (Computer/Tech) - Ted Coombs
Crafting an Information Security Playbook - Jeff Bollinger

RRP $95.00

$43.25

54%
OFF
Principles of Information Security : 6th Edition - Michael E. Whitman

RRP $149.95

$129.95

13%
OFF