|
Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Hacking Multifactor Authentication (Paperback)
Loot Price: R770
Discovery Miles 7 700
You Save: R136
(15%)
|
|
|
Hacking Multifactor Authentication (Paperback)
Expected to ship within 9 - 17 working days
|
Protect your organization from scandalously easy-to-hack MFA
security "solutions" Multi-Factor Authentication (MFA) is spreading
like wildfire across digital environments. However, hundreds of
millions of dollars have been stolen from MFA-protected online
accounts. How? Most people who use multifactor authentication (MFA)
have been told that it is far less hackable than other types of
authentication, or even that it is unhackable. You might be shocked
to learn that all MFA solutions are actually easy to hack. That's
right: there is no perfectly safe MFA solution. In fact, most can
be hacked at least five different ways. Hacking Multifactor
Authentication will show you how MFA works behind the scenes and
how poorly linked multi-step authentication steps allows MFA to be
hacked and compromised. This book covers over two dozen ways that
various MFA solutions can be hacked, including the methods (and
defenses) common to all MFA solutions. You'll learn about the
various types of MFA solutions, their strengthens and weaknesses,
and how to pick the best, most defensible MFA solution for your (or
your customers') needs. Finally, this book reveals a simple method
for quickly evaluating your existing MFA solutions. If using or
developing a secure MFA solution is important to you, you need this
book. Learn how different types of multifactor authentication work
behind the scenes See how easy it is to hack MFA security
solutions--no matter how secure they seem Identify the strengths
and weaknesses in your (or your customers') existing MFA security
and how to mitigate Author Roger Grimes is an internationally known
security expert whose work on hacking MFA has generated significant
buzz in the security world. Read this book to learn what decisions
and preparations your organization needs to take to prevent losses
from MFA hacking.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.