Description |
xxxi, 542 pages : illustrations ; 24 cm |
Summary |
Explains how multifactor authentication (MFA) works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised, and describes ways that various MFA solutions can also be hacked, covering the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution to meet an organization's needs. |
Note |
Includes index. |
Subject |
Computers -- Access control.
|
|
Computer security -- Management.
|
|
Hackers.
|
|
Hacking.
|
ISBN |
9781119650799 pbk. |
|