Security and Usability: Designing Secure Systems That People Can Use
| Chapter 13: Guidelines and Strategies for Secure Interaction Design Chapter 14: Fighting Phishing at the User Interface Chapter 15: Sanitization and Usability Chapter 16: Making the Impossible Easy: Usable PKI Chapter 17: Simple Desktop Security with Chameleon Chapter 18: Security Administration Tools and Practices |