Cargando…

Two-factor authentication

During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight a...

Descripción completa

Detalles Bibliográficos
Autor principal: Stanislav, Mark
Lenguaje:eng
Publicado: IT Governance 2015
Materias:
Acceso en línea:http://cds.cern.ch/record/2050372