Hacking Multifactor Authentication (Wiley) |
Monday, 02 November 2020 | |||
This book covers over two dozen ways that various mutifactor authentication (MFA) solutions can be hacked, including the methods (and defenses) common to all MFA solutions. Roger A Grimes discusses the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. <ASIN:1119650798> The book covers how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. Finally, Grimes explains a simple method for quickly evaluating your existing MFA solutions. Author: Roger A Grimes
For more Book Watch just click. Book Watch is I Programmer's listing of new books and is compiled using publishers' publicity material. It is not to be read as a review where we provide an independent assessment. Some, but by no means all, of the books in Book Watch are eventually reviewed. To have new titles included in Book Watch contact BookWatch@i-programmer.info Follow @bookwatchiprog on Twitter or subscribe to I Programmer's Books RSS feed for each day's new addition to Book Watch and for new reviews.
|