null
Loading... Please wait...
FREE SHIPPING on All Unbranded Items LEARN MORE
Print This Page

Integrating a Usable Security Protocol into User Authentication Services Design Process - 9780367656928

List Price: $59.99
SKU:
9780367656928
Quantity:
Minimum Purchase
25 unit(s)
  • Availability: Confirm prior to ordering
  • Branding: minimum 50 pieces (add’l costs below)
  • Check Freight Rates (branded products only)

Branding Options (v), Availability & Lead Times

  • 1-Color Imprint: $2.00 ea.
  • Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
  • Belly-Band Wrap: $2.50 ea. (full-color printed)
  • Set-Up Charge: $45 per decoration
FULL DETAILS
  • Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
  • Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
  • Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
  • RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
  • Product Details

    Author:
    Christina Braz, Ahmed Seffah, Bilal Naqvi
    Format:
    Paperback
    Pages:
    412
    Publisher:
    CRC Press (September 30, 2020)
    Language:
    English
    ISBN-13:
    9780367656928
    Weight:
    21.875oz
    Dimensions:
    6.125" x 9.1875"
    File:
    TAYLORFRANCIS-TayFran_260406043133783-20260406.xml
    Folder:
    TAYLORFRANCIS
    List Price:
    $59.99
    As low as:
    $56.99
    Publisher Identifier:
    P-CRC
    Discount Code:
    H
    Pub Discount:
    30
    Country of Origin:
    United States
    Imprint:
    Auerbach Publications
    Case Pack:
    1
  • Overview

    There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.