Hacking Multifactor Authentication (Wiley)
Monday, 02 November 2020

This book covers over two dozen ways that various mutifactor authentication (MFA) solutions can be hacked, including the methods (and defenses) common to all MFA solutions. Roger A Grimes discusses the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs.

The book covers how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. Finally, Grimes explains a simple method for quickly evaluating your existing MFA solutions.

Author: Roger A Grimes
Publisher: Wiley
Date: October 2020
Pages: 576
ISBN: 978-1119650799
Print: 1119650798
Kindle: B08KG65Q3V
Audience: People interested in security
Level: Intermediate
Category: Security

 

For more Book Watch just click.

Book Watch is I Programmer's listing of new books and is compiled using publishers' publicity material. It is not to be read as a review where we provide an independent assessment. Some, but by no means all, of the books in Book Watch are eventually reviewed.

To have new titles included in Book Watch contact  BookWatch@i-programmer.info

Follow @bookwatchiprog on Twitter or subscribe to I Programmer's Books RSS feed for each day's new addition to Book Watch and for new reviews.

 

 

Banner
 


Software Architecture In Practice

Author: Len Bass, Dr. Paul Clements and Rick Kazman
Publisher: Addison-Wesley Professional
Pages: 464
ISBN: 978-0136886099
Print: 0136886094
Kindle: B094CPJ96B
Audience: Software architects
Rating: 4.5
Reviewer: Kay Ewbank

This is the fourth edition of a book widely regarded as a classic since its firs [ ... ]



Software Requirements Essentials

Authors: Karl Wiegers and Candase Hokanson
Publisher: Addison-Wesley
Pages: 208
ISBN: 9780138190286
Print: 0138190283
Kindle: B0BTLC53FF
Audience: General
Rating: 4.5
Reviewer: Kay Ewbank

This slim book looks at how to work out the requirements for a software project through twenty 'practices' that you c [ ... ]


More Reviews