This book is about creating usable products. The techniques, taken from the worlds of human-computer interaction, marketing, and many of the social sciences, help you know who your users are, and to make security a natural outcome of the requirements and design phase of the authentication method development life cycle.