Authentication: From Passwords to Public Keys Book + PRICE WATCH * Amazon pricing is not included in price watch

Authentication: From Passwords to Public Keys Book

Authentication: From Passwords to Public Keys examines the whole range of authentication options, and offers advice on which one might be right for your security requirements, budget, and tolerance for user inconvenience. As the "public keys" part of the title implies, this book also deals with some aspects of encryption. One of the key problems of computer security is that of guaranteeing that an entity (person or system) really is who he, she, or it claims to be. Authentication procedures may be very trusting (as for "guest" accounts with limited capability), moderately strong (your bank requires both a physical card and a PIN before it will dispense money from an ATM), or nearly foolproof (biometric devices, which examine--to cite two examples--retina scans or fingerprints). Rather than present a menagerie of security techniques and explain their strengths and weaknesses in an academic way, Richard Smith demonstrates the strength of protection mechanisms in the only way that counts--he shows how they can be defeated, and at what expenditure of effort. He's also made lists of attacks, complete with assessments of the popularity of each and the particular risk it poses, and a similar list of defences. Margin notes refer to list entries by number, so it's easy to see what problems and solutions are covered in a given passage of text--though there's no index of references to attacks and defences by number. --David Wall Topics covered: how to defend computer systems, primarily through the application of identity-verification techniques. Those covered include passwords (including the randomly generated kind, and their hashes), authentication by machine address, biometric examination, smart cards and RSA public-key cryptography.Read More

from£N/A | RRP: £34.99
* Excludes Voucher Code Discount Also available Used from £N/A
  • Foyles

    Gives an understanding of what an organization needs to reliably identify its users and how different techniques for verifying identity are executed. Describing the...

  • 0201615991
  • 9780201615999
  • Richard E. Smith
  • 1 October 2001
  • Addison Wesley
  • Paperback (Book)
  • 576
  • 1
As an Amazon Associate we earn from qualifying purchases. If you click through any of the links below and make a purchase we may earn a small commission (at no extra cost to you). Click here to learn more.

Would you like your name to appear with the review?

We will post your book review within a day or so as long as it meets our guidelines and terms and conditions. All reviews submitted become the licensed property of www.find-book.co.uk as written in our terms and conditions. None of your personal details will be passed on to any other third party.

All form fields are required.