Hacking Multifactor Authentication (Wiley)
Monday, 02 November 2020

This book covers over two dozen ways that various mutifactor authentication (MFA) solutions can be hacked, including the methods (and defenses) common to all MFA solutions. Roger A Grimes discusses the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs.

<ASIN:1119650798>

The book covers how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. Finally, Grimes explains a simple method for quickly evaluating your existing MFA solutions.

Author: Roger A Grimes
Publisher: Wiley
Date: October 2020
Pages: 576
ISBN: 978-1119650799
Print: 1119650798
Kindle: B08KG65Q3V
Audience: People interested in security
Level: Intermediate
Category: Security

 

For more Book Watch just click.

Book Watch is I Programmer's listing of new books and is compiled using publishers' publicity material. It is not to be read as a review where we provide an independent assessment. Some, but by no means all, of the books in Book Watch are eventually reviewed.

To have new titles included in Book Watch contact  BookWatch@i-programmer.info

Follow @bookwatchiprog on Twitter or subscribe to I Programmer's Books RSS feed for each day's new addition to Book Watch and for new reviews.

 

 

Banner
 


NoSQL for Mere Mortals

Author: Dan Sullivan
Publisher: Wiley
Date: April 16, 2015
Pages: 552
ISBN: 9780134023212
Print: 0134023218
Kindle: B00VO27P1K
Audience: Techies learning about NoSQL
Rating: 4

Reviewer:  Kay Ewbank

Confused about the range of options on offer from NoSQL? Will this book  [ ... ]



The Dream Team Nightmare

Author: Portia Tung
Publisher: Pragmatic Bookshelf, 2013
Pages: 304
ISBN: 978-1937785718
Print: 1937785718
Kindle: B00I9GR4UQ
Audience: Anyone who has worked on an agile project or is thinking about trying it
Rating: 4
Reviewer: Lucy Black

A novel approach to teaching lessons about using Agile techn [ ... ]


More Reviews