Hacking Multifactor Authentication - Roger A Grimes
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre40,72 €
Produit Neuf
Ou 10,18 € /mois
- Livraison à 0,01 €
- Livré entre le 23 et le 30 mai
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781119650799_dbm
Nos autres offres
-
42,55 €
Produit Neuf
Ou 10,64 € /mois
- Livraison à 0,01 €
Nouvel article expédié dans le 24H à partir des Etats Unis Livraison au bout de 20 à 30 jours ouvrables.
-
45,67 €
Produit Neuf
Ou 11,42 € /mois
- Livraison à 0,01 €
Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.
-
46,24 €
Produit Neuf
Ou 11,56 € /mois
- Livraison : 3,99 €
- Livré entre le 23 et le 27 mai
-
50,99 €
Produit Neuf
Ou 12,75 € /mois
- Livraison : 5,00 €
- Livré entre le 23 et le 27 mai
Exp¿di¿ en 7 jours ouvr¿s
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Hacking Multifactor Authentication de Roger A Grimes Format Broché - Livre Informatique
0 avis sur Hacking Multifactor Authentication de Roger A Grimes Format Broché - Livre Informatique
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Perfectionnement Italien
2 avis
Occasion dès 21,50 €
-
L'italien
2 avis
Neuf dès 26,90 €
Occasion dès 26,49 €
-
Historia De España En La Edad Moderna
Occasion dès 25,00 €
-
Baal
Neuf dès 24,03 €
-
Joel Meyerowitz: Europa 1966-1967
Neuf dès 50,00 €
-
Western Technology And Soviet Economic Development 1945-1968
Neuf dès 60,23 €
-
La Méthodologie Wyckoff En Profondeur: Comment Effectuer Des Transactions Logiques Sur Les Marchés Financiers.
Occasion dès 26,08 €
-
Toute Photographie Fait Énigme
Occasion dès 45,80 €
-
Quantum Computing: An Applied Approach
Occasion dès 39,00 €
-
Bonahuc, Au Coeur Des Cévennes
Occasion dès 29,00 €
-
Ernst Haas - New York In Color, 1952-1962
1 avis
Neuf dès 49,54 €
-
Implementing Domain-Driven Design
Neuf dès 63,38 €
Occasion dès 46,72 €
-
Handbook Of Multilingualism And Multiculturalism
Neuf dès 60,00 €
Occasion dès 50,00 €
-
Oswald Wirth Tarot Deck: 78-Card Deck
2 avis
Neuf dès 22,53 €
Occasion dès 21,75 €
-
Billy Showell's Botanical Painting In Watercolour
1 avis
Neuf dès 29,93 €
-
A Comprehensive Guide To Sanum Therapy According To Prof. Enderlein
Neuf dès 27,83 €
-
Berenice Abbott: A Life In Photography
Neuf dès 51,19 €
Occasion dès 30,42 €
-
Annales Corrigees Du Bepc, Anglais, Fasc. 4, 1966
1 avis
Occasion dès 20,90 €
-
Gerhard Richter: Im Albertinum Dresden
Occasion dès 36,32 €
-
Perfectionnement Allemand
1 avis
Neuf dès 26,90 €
Occasion dès 24,49 €
Produits similaires
Présentation Hacking Multifactor Authentication de Roger A Grimes Format Broché
- Livre Informatique
Résumé : A thoughtful demonstration that, like all security technologies, MFA is not a panacea. Roger provides example after example that there is no silver bullet computer security defense. MFA alone will not protect you against sophisticated adversaries. The real problems behind computer security involve people and making the appropriate risk decisions. DISCOVER THE STRENGTHS AND WEAKNESSES OF MULTI-FACTOR AUTHENTICATION So-called experts point to multifactor authentication (MFA) as the solution to most hacks and breaches. But, far from being the unhackable, off- the-shelf panacea they're widely touted to be, MFA systems require careful planning and design in order to be properly secured and not fall prey to the dozens of real-world MFA vulnerabilities Roger A. Grimes details in Hacking Multifactor Authentication. Administrators and users of multifactor authentication systems will learn that all MFA systems can be hacked, most in at least five different ways. Anyone telling you MFA can't be hacked is either trying to sell you something or na?ve. Either way, you'll want to avoid their advice. You'll learn how to mitigate the most common MFA security loopholes to prevent bad actors from accessing your systems. Readers will learn to quickly and comprehensively evaluate their own MFA solutions to assess their vulnerability to the known hacking methods. This book provides real-world example MFA hacks and the practical strategies to prevent them. Perfect for CISSPs, CIOs, CISOs, and penetration testers, Hacking Multifactor Authentication also belongs on the bookshelves of any information security professional interested in creating or improving their MFA security infrastructure. Learn:
?BRUCE SCHNEIER
? KEVIN MITNICK
...
Biographie: Introduction xxv Who This Book is For xxvii What is Covered in This Book? xxvii MFA is Good xxx How to Contact Wiley or the Author xxxi Part I Introduction 1 1 Logon Problems 3 It's Bad Out There 3 The Problem with Passwords 5 Password Basics 9 Identity 9 The Password 10 Password Registration 11 Password Complexity 11 Password Storage 12 Password Authentication 13 Password Policies 15 Passwords Will Be with Us for a While 18 Password Problems and Attacks 18 Password Guessing 19 Password Hash Cracking 23 Password Stealing 27 Passwords in Plain View 28 Just Ask for It 29 Password Hacking Defenses 30 MFA Riding to the Rescue? 31 Summary 32 2 Authentication Basics 33 Authentication Life Cycle 34 Identity 35 Authentication 46 Authorization 54 Accounting/Auditing 54 Standards 56 Laws of Identity 56 Authentication Problems in the Real World 57 Summary 58 3 Types of Authentication 59 Personal Recognition 59 Knowledge-Based Authentication 60 Passwords 60 PINS 62 Solving Puzzles 64 Password Managers 69 Single Sign-Ons and Proxies 71 Cryptography 72 Encryption 73 Public Key Infrastructure 76 Hashing 79 Hardware Tokens 81 One-Time Password Devices 81 Physical Connection Devices 83 Wireless 87 Phone-Based 89 Voice Authentication 89 Phone Apps 89 SMS 92 Biometrics 92 FIDO 93 Federated Identities and APIs 94 OAuth 94 APIs 96 Contextual/Adaptive 96 Less Popular Methods 97 Voiceover Radio 97 Paper-Based 98 Summary 99 4 Usability vs Security 101 What Does Usability Mean? 101 We Don't Really Want the Best Security 103 Security Isn't Usually Binary 105 Too Secure 106 Seven-Factor MFA 106 Moving ATM Keypad Numbers 108 Not as Worried as You Think About Hacking 109 Unhackable Fallacy 110 Unbreakable Oracle 113 DJB 113 Unhackable Quantum Cryptography 114 We are Reactive Sheep 115 Security Theater r 116 Security by Obscurity 117 MFA Will Cause Slowdowns 117 MFA Will Cause Downtime 118 No MFA Solution Works Everywhere 118 Summary 119 Part II Hacking MFA 121 5 Hacking MFA in General 123 MFA Dependency Components 124 Enrollment 125 User 127 Devices/Hardware 127 Software 128 API 129 Authentication Factors 129 Authentication Secrets Store 129 Cryptography 130 Technology 130 Transmission/Network Channel 131 Namespace 131 Supporting Infrastructure 131 Relying Party 132 Federation/Proxies 132 Alternate Authentication Methods/Recovery 132 Migrations 133 Deprovision 133 MFA Component Conclusion 134 Main Hacking Methods 134 Technical Attacks 134 Human Element 135 Physical 137 Two or More Hacking Methods Used 137 You Didn't Hack the MFA! 137 How MFA Vulnerabilities are Found 138 Threat Modeling 138 Code Review 138 Fuzz Testing 138 Penetration Testing 139 Vulnerability Scanning 139 Human Testing 139 Accidents 140 Summary 140 6 Access Control Token Tricks 141 Access Token Basics 141 Access Control Token General ...
Sommaire: ROGER A. GRIMES is a computer security professional and penetration tester with over three decades of experience. He's an internationally renowned consultant and was the IDG/InfoWorld/CSO magazine weekly columnist for fifteen years. He's a sought-after speaker who has given talks at major security industry events, including RSA, Black Hat, and TechMentor....
Détails de conformité du produit
Personne responsable dans l'UE