Authentication. From Passwords to Public Keys (Broché)

  • Addison-Wesley / Helix Books

  • Paru le : 01/12/2001
Note moyenne : |
Ce produit n'a pas encore été évalué. Soyez le premier !
Donnez votre avis !
Computer access control is an ongoing challenge. Left to themselves, computers tend to treat one user no differently than another. Computers use authentication... > Lire la suite
55,90 €
Neuf - Expédié sous 2 à 4 semaines
  • ou
    Livré chez vous
    entre le 11 octobre et le 25 octobre
Votre note
Computer access control is an ongoing challenge. Left to themselves, computers tend to treat one user no differently than another. Computers use authentication to confidently associate an identity with a person. Authentication: From Passwords to Public Keys gives readers a clear understanding of what an organization needs to reliably identify its users and how different techniques for verifying identity are executed. Authentication is one of the basic building blocks of security. To allow a computer system to distinguish between legitimate users and others, most sites give passwords to authorized users. Unfortunately, just as car thieves have found ways to defeat sophisticated locks and alarms, computer hackers are always finding new ways to circumvent password systems. The good news is that organizations now have available to them a broad range of alternatives to passwords, and a variety of ways to make passwords safer. A well-designed authentication system allows users to prove their identities conveniently and gain access to the network without threatening the safety of the organization. The first of its kind, Authentication describes the entire range of authentication methods used today. It examines situations in which certain techniques fail and points out ways to strengthen them. Network professionals, designers, developers, administrators, planners, and managers will find in these pages the authentication strategy to protect their valuable systems. Through diagrams and examples, the author thoroughly explains the technical concepts behind authentication, focusing on existing, off-the-shelf solutions to security problems. Authentication highlights real products and solutions. If you are a network professional searching for the how and why of computer authentication, this is the book that will help you prevent unauthorized access on your network.
    • The Authentication Landscape
    • Evolution of Reusable Password
    • Integrating People
    • Design Patterns
    • Local Authentication
    • Picking PINs and Passwords
    • Biometrics
    • Authentication by Address
    • Authentication Tokens
    • Challenge Response Passwords
    • Indirect Authentication
    • Kerberos and Windows 2000
    • Public Keys and Off-Line Authentication
    • Public Key Certificates
    • Private Key Security
  • Date de parution : 01/12/2001
  • Editeur : Addison-Wesley / Helix Books
  • ISBN : 0-201-61599-1
  • EAN : 9780201615999
  • Présentation : Broché
  • Nb. de pages : 549 pages
  • Poids : 0.85 Kg
  • Dimensions : 18,5 cm × 23,0 cm × 2,5 cm

Biographie de Richard-E Smith

Richard E. Smith, Ph.D., CISSP has spent over a decade as a computer security professional. Author of Internet Cryptography (Addison-Wesley, 1997), he is a researcher and information security architect at Secure Computing Corporation, a leading computer security company.

Nos avis clients sur

Avis Trustpilot

Authentication. From Passwords to Public Keys est également présent dans les rayons

Richard-E Smith - .
Authentication. From Passwords to Public Keys
55,90 €
Haut de page
Decitre utilise des cookies pour vous offrir le meilleur service possible. En continuant votre navigation, vous en acceptez l'utilisation. En savoir plus OK

Ne partez pas tout de suite...

Inscription newsletter