
Résumé
Authentication is one of the basic building blocks of security. To allow a computer system to distinguish between legitimate users and others, most sites give passwords to authorized users. Unfortunately, just as car thieves pick locks, computer hackers have found ways to circumvent many password systems. But today, organizations have a broad range of alternatives to passwords, and a variety of ways to make passwords safer. A well-designed authentication system allows users to prove their identities and gain access to the network without threatening the safety of the organization.
The first of its kind, Authentication describes the entire range of authentication methods used today. It examines situations in which certain techniques fail and points out ways to strengthen them. Network professionals, designers, developers, administrators, planners, and managers will discover the right authentication strategy to achieve results. Through diagrams and examples, the author thoroughly explains the technical concepts behind authentication, focusing on existing, off-the-shelf solutions to security problems.
Authentication: From Passwords to Public Keys highlights real products and solutions, not novel technology that seems promising. If you are a network professional searching for the how and why of computer authentication, then this is the book that will help you prevent unauthorized access on your network.
Table of Contents
- Preface
- What This Book is About
- Who This Book is For
- Acknowledgments
- Chapter 1: The Authentication Landscape
- Chapter 2: Evolution of Reusable Passwords
- Chapter 3: Integrating People
- Chapter 4: Design Patterns
- Chapter 5: Local Authentication
- Chapter 6: Picking PINs and Passwords
- Chapter 7: Biometrics
- Chapter 8: Authentication by Address
- Chapter 9: Authentication Tokens
- Chapter 10: Challenge Response Passwords
- Chapter 11: Indirect Authentication
- Chapter 12: Kerberos and Windows 2000
- Chapter 13: Public Keys and Off-Line Authentication
- Chapter 14: Public Key Certificates
- Chapter 15: Private Key Security
- Appendix A: Chapter Notes
- Appendix B: Sources
- Appendix C: Glossary
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Addison Wesley |
Auteur(s) | Richard E. Smith |
Parution | 29/10/2001 |
Nb. de pages | 550 |
Format | 18,5 x 23,4 |
Couverture | Broché |
Poids | 853g |
Intérieur | Noir et Blanc |
EAN13 | 9780201615999 |
ISBN13 | 978-0-201-61599-9 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Cryptographie
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet