Hacking multifactor authentication / (Record no. 69323)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04561cam a2200505Ia 4500 |
001 - CONTROL NUMBER | |
control field | on1198019471 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220711203613.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200929s2021 inu o 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119672357 |
-- | (electronic bk. : oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 111967235X |
-- | (electronic bk. : oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119672340 |
-- | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119672341 |
-- | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119650805 |
-- | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119650801 |
-- | (electronic bk.) |
029 1# - (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000068068981 |
037 ## - | |
-- | F94E0825-B214-4259-8F76-4A4E6FB0546C |
-- | OverDrive, Inc. |
-- | http://www.overdrive.com |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
100 1# - AUTHOR NAME | |
Author | Grimes, Roger A. |
245 10 - TITLE STATEMENT | |
Title | Hacking multifactor authentication / |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | Indianapolis, IN : |
Publisher | Wiley, |
Year of publication | [2021]. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Cover -- Title Page -- Copyright Page -- About the Author -- Acknowledgments -- Contents at a Glance -- Contents -- Introduction -- Who This Book Is For -- What Is Covered in This Book? -- MFA Is Good -- How to Contact Wiley or the Author -- Part I Introduction -- Chapter 1 Logon Problems -- It's Bad Out There -- The Problem with Passwords -- Password Basics -- Identity -- The Password -- Password Registration -- Password Complexity -- Password Storage -- Password Authentication -- Password Policies -- Passwords Will Be with Us for a While -- Password Problems and Attacks -- Password Guessing |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | Password Hash Cracking -- Password Stealing -- Passwords in Plain View -- Just Ask for It -- Password Hacking Defenses -- MFA Riding to the Rescue? -- Summary -- Chapter 2 Authentication Basics -- Authentication Life Cycle -- Identity -- Authentication -- Authorization -- Accounting/Auditing -- Standards -- Laws of Identity -- Authentication Problems in the Real World -- Summary -- Chapter 3 Types of Authentication -- Personal Recognition -- Knowledge-Based Authentication -- Passwords -- PINS -- Solving Puzzles -- Password Managers -- Single Sign-Ons and Proxies -- Cryptography -- Encryption |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | Public Key Infrastructure -- Hashing -- Hardware Tokens -- One-Time Password Devices -- Physical Connection Devices -- Wireless -- Phone-Based -- Voice Authentication -- Phone Apps -- SMS -- Biometrics -- FIDO -- Federated Identities and APIs -- OAuth -- APIs -- Contextual/Adaptive -- Less Popular Methods -- Voiceover Radio -- Paper-Based -- Summary -- Chapter 4 Usability vs. Security -- What Does Usability Mean? -- We Don't Really Want the Best Security -- Security Isn't Usually Binary -- Too Secure -- Seven-Factor MFA -- Moving ATM Keypad Numbers -- Not as Worried as You Think About Hacking |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | Unhackable Fallacy -- Unbreakable Oracle -- DJB -- Unhackable Quantum Cryptography -- We Are Reactive Sheep -- Security Theater -- Security by Obscurity -- MFA Will Cause Slowdowns -- MFA Will Cause Downtime -- No MFA Solution Works Everywhere -- Summary -- Part II Hacking MFA -- Chapter 5 Hacking MFA in General -- MFA Dependency Components -- Enrollment -- User -- Devices/Hardware -- Software -- API -- Authentication Factors -- Authentication Secrets Store -- Cryptography -- Technology -- Transmission/Network Channel -- Namespace -- Supporting Infrastructure -- Relying Party |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | Federation/Proxies -- Alternate Authentication Methods/Recovery -- Migrations -- Deprovision -- MFA Component Conclusion -- Main Hacking Methods -- Technical Attacks -- Human Element -- Physical -- Two or More Hacking Methods Used -- "You Didn't Hack the MFA!" -- How MFA Vulnerabilities Are Found -- Threat Modeling -- Code Review -- Fuzz Testing -- Penetration Testing -- Vulnerability Scanning -- Human Testing -- Accidents -- Summary -- Chapter 6 Access Control Token Tricks -- Access Token Basics -- Access Control Token General Hacks -- Token Reproduction/Guessing -- Token Theft |
500 ## - GENERAL NOTE | |
Remark 1 | Includes index. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Access control |
-- | Testing. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1002/9781119672357 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computers |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
994 ## - | |
-- | 92 |
-- | DG1 |
No items available.