Hacking Multifactor Authentication (Record no. 814765)

MARC details
000 -LEADER
fixed length control field 03060nam a22002537a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240215s2021 |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119650799
022 ## - INTERNATIONAL STANDARD SERIAL NUMBER
ISSN-L 9781119650799
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Item number GRI
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Grimes, Roger A.
9 (RLIN) 636674
Relator term author
245 ## - TITLE STATEMENT
Title Hacking Multifactor Authentication
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Indianapolis, IN :
Name of publisher, distributor, etc. Wiley,
Date of publication, distribution, etc. c2021
300 ## - PHYSICAL DESCRIPTION
Extent xxxi, 542 p.
Other physical details : ill
500 ## - GENERAL NOTE
General note About the Author<br/><br/>ROGER A. GRIMES is a computer security professional and penetration tester with over three decades of experience. He's an internationally renowned consultant and was the IDG/InfoWorld/CSO magazine weekly columnist for fifteen years. He's a sought-after speaker who has given talks at major security industry events, including RSA, Black Hat, and TechMentor.<br/>
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes Index
520 ## - SUMMARY, ETC.
Summary, etc. SUMMARY<br/><br/>Protect your organization from scandalously easy-to-hack MFA security “solutions” <br/><br/>Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That’s right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. <br/><br/>This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions. You’ll learn about the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book. <br/><br/> Learn how different types of multifactor authentication work behind the scenes<br/> See how easy it is to hack MFA security solutions—no matter how secure they seem<br/> Identify the strengths and weaknesses in your (or your customers’) existing MFA security and how to mitigate<br/><br/>Author Roger Grimes is an internationally known security expert whose work on hacking MFA has generated significant buzz in the security world. Read this book to learn what decisions and preparations your organization needs to take to prevent losses from MFA hacking.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 598439
Topical term or geographic name entry element Hacking
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 158115
Topical term or geographic name entry element Hackers
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 154773
Topical term or geographic name entry element Cryptography
856 ## - ELECTRONIC LOCATION AND ACCESS
Link text TOC
Uniform Resource Identifier <a href="https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9781119650799.pdf">https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9781119650799.pdf</a>
856 ## - ELECTRONIC LOCATION AND ACCESS
Link text WEB LINK
Uniform Resource Identifier <a href="https://www.wiley.com/en-us/Hacking+Multifactor+Authentication-p-9781119650799">https://www.wiley.com/en-us/Hacking+Multifactor+Authentication-p-9781119650799</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Physical Form Damaged status Not for loan Purchased by Department/Discipline Home library Current library Shelving location Date acquired Source of acquisition Stock Type Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Budget Year Cost, replacement price Accession Date Koha item type
    Dewey Decimal Classification Text, Paperback     Engr Abul Kalam Library TIEST (Thar) Library TIEST (Thar) Library Computer Science & Information Technology - Thar Institute 13/02/2024 24 Purchased 10929.28   005.82 GRI 98608 13/02/2024 2023-24 10929.28 13/02/2024 Reference Collection