This book discusses the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organisations and individuals would want to use two factor, and core milestones in the progress of growing the market.
This book discusses the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organisations and individuals would want to use two factor, and core milestones in the progress of growing the market.
Two-Factor Authentication
104Two-Factor Authentication
104Product Details
ISBN-13: | 9781849287340 |
---|---|
Publisher: | IT Governance Publishing |
Publication date: | 05/05/2015 |
Series: | Fundamentals Series , #4 |
Sold by: | Barnes & Noble |
Format: | eBook |
Pages: | 104 |
File size: | 314 KB |