Two-Factor Authentication

This book discusses the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organisations and individuals would want to use two factor, and core milestones in the progress of growing the market.

1300253029
Two-Factor Authentication

This book discusses the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organisations and individuals would want to use two factor, and core milestones in the progress of growing the market.

14.99 In Stock
Two-Factor Authentication

Two-Factor Authentication

by Mark Stanislav
Two-Factor Authentication
Two-Factor Authentication

Two-Factor Authentication

by Mark Stanislav

eBook

$14.99  $19.99 Save 25% Current price is $14.99, Original price is $19.99. You Save 25%.

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

This book discusses the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organisations and individuals would want to use two factor, and core milestones in the progress of growing the market.


Product Details

ISBN-13: 9781849287340
Publisher: IT Governance Publishing
Publication date: 05/05/2015
Series: Fundamentals Series , #4
Sold by: Barnes & Noble
Format: eBook
Pages: 104
File size: 314 KB

About the Author

Mark Stanislav is an information technology professional with over a decade’s varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7.

Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon, and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace, and The Register have featured Mark’s research, initiatives, and insights on information security.

Mark earned both his Bachelor of Science Degree in Networking & IT Administration and his Master of Science Degree in Technology Studies, focused on Information Assurance, from Eastern Michigan University. He also holds CISSP, Security+, Linux+, and CCSK certifications.


Mark Stanislav is an information technology professional with over a decade’s varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7.

Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon, and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace, and The Register have featured Mark’s research, initiatives, and insights on information security.

Mark earned both his Bachelor of Science Degree in Networking & IT Administration and his Master of Science Degree in Technology Studies, focused on Information Assurance, from Eastern Michigan University. He also holds CISSP, Security+, Linux+, and CCSK certifications.

Table of Contents

1: Introduction

2: Risks to One-Factor Authentication

3: Understanding the Basics

4: Second-Factor Technologies

5: Standards and Regulations

6: Two Factor for Internet End-Users

7: Conclusion

From the B&N Reads Blog

Customer Reviews