Implementing multifactor authentication: protect your applications from cyberattacks with the help of MFA
Multifactor authentication has emerged as one of the best ways to tackle the global cybersecurity concerns in recent years, but choosing the wrong MFA solution for your needs can do more harm than good. Implementing Multifactor Authentication will show you how to choose, deploy, and troubleshoot mul...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham ; Mumbai
Packt Publishing
June 2023
|
Schlagworte: | |
Online-Zugang: | DE-Aug4 DE-1050 DE-573 DE-898 DE-91 DE-706 URL des Erstveröffentlichers |
Zusammenfassung: | Multifactor authentication has emerged as one of the best ways to tackle the global cybersecurity concerns in recent years, but choosing the wrong MFA solution for your needs can do more harm than good. Implementing Multifactor Authentication will show you how to choose, deploy, and troubleshoot multiple authentication methods in your applications to make them safer without compromising the user experience. You'll start with an introduction to authentication and explain how MFA comes into the picture along with understanding why it is important. You will learn how MFA works and the types currently available on the market. As you progress through the chapters, you will learn how to choose the right MFA set up to keep the user experience as friendly as possible. You'll also explore different ways how hackers bypass MFA and how to protect your applications from these attacks. Next, you'll delve into how MFA helps mitigate cyber threats, cover best practices, and real-world scenarios. You'll also learn how to enable and manage the MFA model in public clouds like AWS, Azure, and GCP, how biometrics fits into the equation, and what the next wave of innovation might bring. By the end of this book, you will understand how to secure MFA solutions and how your organization can protect itself from MFA hacking. |
Beschreibung: | 1 Online-Ressource (xxii, 527 Seiten) |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049092537 | ||
003 | DE-604 | ||
005 | 20240207 | ||
007 | cr|uuu---uuuuu | ||
008 | 230807s2023 xx o|||| 00||| eng d | ||
015 | |a GBC2M1077 |2 dnb | ||
020 | |z 9781803240589 |9 978-1-80324-058-9 | ||
035 | |a (ZDB-221-PCR)9781803240589 | ||
035 | |a (OCoLC)1401190564 | ||
035 | |a (DE-599)BVBBV049092537 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-91 |a DE-573 |a DE-706 |a DE-898 | ||
100 | 1 | |a Fanti, Marco |e Verfasser |4 aut | |
245 | 1 | 0 | |a Implementing multifactor authentication |b protect your applications from cyberattacks with the help of MFA |c Marco Fanti |
264 | 1 | |a Birmingham ; Mumbai |b Packt Publishing |c June 2023 | |
300 | |a 1 Online-Ressource (xxii, 527 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Multifactor authentication has emerged as one of the best ways to tackle the global cybersecurity concerns in recent years, but choosing the wrong MFA solution for your needs can do more harm than good. Implementing Multifactor Authentication will show you how to choose, deploy, and troubleshoot multiple authentication methods in your applications to make them safer without compromising the user experience. You'll start with an introduction to authentication and explain how MFA comes into the picture along with understanding why it is important. You will learn how MFA works and the types currently available on the market. As you progress through the chapters, you will learn how to choose the right MFA set up to keep the user experience as friendly as possible. You'll also explore different ways how hackers bypass MFA and how to protect your applications from these attacks. Next, you'll delve into how MFA helps mitigate cyber threats, cover best practices, and real-world scenarios. You'll also learn how to enable and manage the MFA model in public clouds like AWS, Azure, and GCP, how biometrics fits into the equation, and what the next wave of innovation might bring. By the end of this book, you will understand how to secure MFA solutions and how your organization can protect itself from MFA hacking. | ||
650 | 4 | |a Computers / Access control | |
650 | 7 | |a Computers / Access control |2 fast | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-80324-696-3 |
856 | 4 | 0 | |u https://portal.igpublish.com/iglibrary/search/PACKT0006839.html |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-30-PQE | ||
912 | |a ZDB-221-PPK | ||
912 | |a ZDB-221-PCL | ||
912 | |a ZDB-221-PCR | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034354233 | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006839.html |l DE-Aug4 |p ZDB-221-PCR |x Verlag |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=30589653 |l DE-1050 |p ZDB-30-PQE |q FHD01_PQE_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006839.html |l DE-573 |p ZDB-221-PCR |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006839.html |l DE-898 |p ZDB-221-PCR |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006839.html |l DE-91 |p ZDB-221-PCL |q TUM_Paketkauf_2024 |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006839.html |l DE-706 |p ZDB-221-PCR |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1822044809140895744 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Fanti, Marco |
author_facet | Fanti, Marco |
author_role | aut |
author_sort | Fanti, Marco |
author_variant | m f mf |
building | Verbundindex |
bvnumber | BV049092537 |
collection | ZDB-30-PQE ZDB-221-PPK ZDB-221-PCL ZDB-221-PCR |
ctrlnum | (ZDB-221-PCR)9781803240589 (OCoLC)1401190564 (DE-599)BVBBV049092537 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049092537</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240207</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230807s2023 xx o|||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC2M1077</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781803240589</subfield><subfield code="9">978-1-80324-058-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-221-PCR)9781803240589</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1401190564</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049092537</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fanti, Marco</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Implementing multifactor authentication</subfield><subfield code="b">protect your applications from cyberattacks with the help of MFA</subfield><subfield code="c">Marco Fanti</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">June 2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 527 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Multifactor authentication has emerged as one of the best ways to tackle the global cybersecurity concerns in recent years, but choosing the wrong MFA solution for your needs can do more harm than good. Implementing Multifactor Authentication will show you how to choose, deploy, and troubleshoot multiple authentication methods in your applications to make them safer without compromising the user experience. You'll start with an introduction to authentication and explain how MFA comes into the picture along with understanding why it is important. You will learn how MFA works and the types currently available on the market. As you progress through the chapters, you will learn how to choose the right MFA set up to keep the user experience as friendly as possible. You'll also explore different ways how hackers bypass MFA and how to protect your applications from these attacks. Next, you'll delve into how MFA helps mitigate cyber threats, cover best practices, and real-world scenarios. You'll also learn how to enable and manage the MFA model in public clouds like AWS, Azure, and GCP, how biometrics fits into the equation, and what the next wave of innovation might bring. By the end of this book, you will understand how to secure MFA solutions and how your organization can protect itself from MFA hacking.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers / Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-80324-696-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006839.html</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PPK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PCL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PCR</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034354233</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006839.html</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=30589653</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">FHD01_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006839.html</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006839.html</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006839.html</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="q">TUM_Paketkauf_2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006839.html</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049092537 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:30:15Z |
indexdate | 2025-01-23T13:02:17Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034354233 |
oclc_num | 1401190564 |
open_access_boolean | |
owner | DE-1050 DE-91 DE-BY-TUM DE-573 DE-706 DE-898 DE-BY-UBR |
owner_facet | DE-1050 DE-91 DE-BY-TUM DE-573 DE-706 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource (xxii, 527 Seiten) |
psigel | ZDB-30-PQE ZDB-221-PPK ZDB-221-PCL ZDB-221-PCR ZDB-30-PQE FHD01_PQE_Kauf ZDB-221-PCL TUM_Paketkauf_2024 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Packt Publishing |
record_format | marc |
spelling | Fanti, Marco Verfasser aut Implementing multifactor authentication protect your applications from cyberattacks with the help of MFA Marco Fanti Birmingham ; Mumbai Packt Publishing June 2023 1 Online-Ressource (xxii, 527 Seiten) txt rdacontent c rdamedia cr rdacarrier Multifactor authentication has emerged as one of the best ways to tackle the global cybersecurity concerns in recent years, but choosing the wrong MFA solution for your needs can do more harm than good. Implementing Multifactor Authentication will show you how to choose, deploy, and troubleshoot multiple authentication methods in your applications to make them safer without compromising the user experience. You'll start with an introduction to authentication and explain how MFA comes into the picture along with understanding why it is important. You will learn how MFA works and the types currently available on the market. As you progress through the chapters, you will learn how to choose the right MFA set up to keep the user experience as friendly as possible. You'll also explore different ways how hackers bypass MFA and how to protect your applications from these attacks. Next, you'll delve into how MFA helps mitigate cyber threats, cover best practices, and real-world scenarios. You'll also learn how to enable and manage the MFA model in public clouds like AWS, Azure, and GCP, how biometrics fits into the equation, and what the next wave of innovation might bring. By the end of this book, you will understand how to secure MFA solutions and how your organization can protect itself from MFA hacking. Computers / Access control Computers / Access control fast Erscheint auch als Druck-Ausgabe 978-1-80324-696-3 https://portal.igpublish.com/iglibrary/search/PACKT0006839.html Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Fanti, Marco Implementing multifactor authentication protect your applications from cyberattacks with the help of MFA Computers / Access control Computers / Access control fast |
title | Implementing multifactor authentication protect your applications from cyberattacks with the help of MFA |
title_auth | Implementing multifactor authentication protect your applications from cyberattacks with the help of MFA |
title_exact_search | Implementing multifactor authentication protect your applications from cyberattacks with the help of MFA |
title_exact_search_txtP | Implementing multifactor authentication protect your applications from cyberattacks with the help of MFA |
title_full | Implementing multifactor authentication protect your applications from cyberattacks with the help of MFA Marco Fanti |
title_fullStr | Implementing multifactor authentication protect your applications from cyberattacks with the help of MFA Marco Fanti |
title_full_unstemmed | Implementing multifactor authentication protect your applications from cyberattacks with the help of MFA Marco Fanti |
title_short | Implementing multifactor authentication |
title_sort | implementing multifactor authentication protect your applications from cyberattacks with the help of mfa |
title_sub | protect your applications from cyberattacks with the help of MFA |
topic | Computers / Access control Computers / Access control fast |
topic_facet | Computers / Access control |
url | https://portal.igpublish.com/iglibrary/search/PACKT0006839.html |
work_keys_str_mv | AT fantimarco implementingmultifactorauthenticationprotectyourapplicationsfromcyberattackswiththehelpofmfa |