Cargando…

Two-factor authentication

During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight a...

Descripción completa

Detalles Bibliográficos
Autor principal: Stanislav, Mark
Lenguaje:eng
Publicado: IT Governance 2015
Materias:
Acceso en línea:http://cds.cern.ch/record/2050372
_version_ 1780948090456375296
author Stanislav, Mark
author_facet Stanislav, Mark
author_sort Stanislav, Mark
collection CERN
description During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organization and individual would want to use two factor, and core milestones in the progress of growing the market.
id cern-2050372
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2015
publisher IT Governance
record_format invenio
spelling cern-20503722021-04-21T20:06:02Zhttp://cds.cern.ch/record/2050372engStanislav, MarkTwo-factor authenticationComputing and Computers During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organization and individual would want to use two factor, and core milestones in the progress of growing the market. IT Governanceoai:cds.cern.ch:20503722015
spellingShingle Computing and Computers
Stanislav, Mark
Two-factor authentication
title Two-factor authentication
title_full Two-factor authentication
title_fullStr Two-factor authentication
title_full_unstemmed Two-factor authentication
title_short Two-factor authentication
title_sort two-factor authentication
topic Computing and Computers
url http://cds.cern.ch/record/2050372
work_keys_str_mv AT stanislavmark twofactorauthentication