Cargando…
Two-factor authentication
During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight a...
Autor principal: | Stanislav, Mark |
---|---|
Lenguaje: | eng |
Publicado: |
IT Governance
2015
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2050372 |
Ejemplares similares
-
Perfect passwords: selection, protection, authentication
por: Burnett, Mark, et al.
Publicado: (2006) -
Advances in user authentication
por: Dasgupta, Dipankar, et al.
Publicado: (2017) -
Query Answer Authentication
por: Pang, HweeHwa, et al.
Publicado: (2012) -
Passwords: philology, security, authentication
por: Lennon, Brian
Publicado: (2018) -
Security and authentication: cybercrime and cybersecurity research
por: Song, Ong Thian, et al.
Publicado: (2017)