Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Authentication
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Authentication

Authentication

From passwords to public keys

Richard E. Smith

550 pages, parution le 29/10/2001

Résumé

Computer access control has always been a challenge. Left to themselves, computers tend to treat one user no differently than another. Computers use authentication to confidently associate an identity with a person. Authentication: From Passwords to Public Keys gives readers a clear understanding of what an organization needs to reliably identify its users and how the different techniques for verifying identity are executed.

Authentication is one of the basic building blocks of security. To allow a computer system to distinguish between legitimate users and others, most sites give passwords to authorized users. Unfortunately, just as car thieves pick locks, computer hackers have found ways to circumvent many password systems. But today, organizations have a broad range of alternatives to passwords, and a variety of ways to make passwords safer. A well-designed authentication system allows users to prove their identities and gain access to the network without threatening the safety of the organization.

The first of its kind, Authentication describes the entire range of authentication methods used today. It examines situations in which certain techniques fail and points out ways to strengthen them. Network professionals, designers, developers, administrators, planners, and managers will discover the right authentication strategy to achieve results. Through diagrams and examples, the author thoroughly explains the technical concepts behind authentication, focusing on existing, off-the-shelf solutions to security problems.

Authentication: From Passwords to Public Keys highlights real products and solutions, not novel technology that seems promising. If you are a network professional searching for the how and why of computer authentication, then this is the book that will help you prevent unauthorized access on your network.

Table of Contents

  • Preface
  • What This Book is About
  • Who This Book is For
  • Acknowledgments
  • Chapter 1: The Authentication Landscape
  • Chapter 2: Evolution of Reusable Passwords
  • Chapter 3: Integrating People
  • Chapter 4: Design Patterns
  • Chapter 5: Local Authentication
  • Chapter 6: Picking PINs and Passwords
  • Chapter 7: Biometrics
  • Chapter 8: Authentication by Address
  • Chapter 9: Authentication Tokens
  • Chapter 10: Challenge Response Passwords
  • Chapter 11: Indirect Authentication
  • Chapter 12: Kerberos and Windows 2000
  • Chapter 13: Public Keys and Off-Line Authentication
  • Chapter 14: Public Key Certificates
  • Chapter 15: Private Key Security
  • Appendix A: Chapter Notes
  • Appendix B: Sources
  • Appendix C: Glossary
  • Index

Caractéristiques techniques

  PAPIER
Éditeur(s) Addison Wesley
Auteur(s) Richard E. Smith
Parution 29/10/2001
Nb. de pages 550
Format 18,5 x 23,4
Couverture Broché
Poids 853g
Intérieur Noir et Blanc
EAN13 9780201615999
ISBN13 978-0-201-61599-9

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription