Cargando…
Two-factor authentication
During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight a...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
IT Governance
2015
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2050372 |
_version_ | 1780948090456375296 |
---|---|
author | Stanislav, Mark |
author_facet | Stanislav, Mark |
author_sort | Stanislav, Mark |
collection | CERN |
description | During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organization and individual would want to use two factor, and core milestones in the progress of growing the market. |
id | cern-2050372 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2015 |
publisher | IT Governance |
record_format | invenio |
spelling | cern-20503722021-04-21T20:06:02Zhttp://cds.cern.ch/record/2050372engStanislav, MarkTwo-factor authenticationComputing and Computers During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organization and individual would want to use two factor, and core milestones in the progress of growing the market. IT Governanceoai:cds.cern.ch:20503722015 |
spellingShingle | Computing and Computers Stanislav, Mark Two-factor authentication |
title | Two-factor authentication |
title_full | Two-factor authentication |
title_fullStr | Two-factor authentication |
title_full_unstemmed | Two-factor authentication |
title_short | Two-factor authentication |
title_sort | two-factor authentication |
topic | Computing and Computers |
url | http://cds.cern.ch/record/2050372 |
work_keys_str_mv | AT stanislavmark twofactorauthentication |