Cargando…

IMPLEMENTING MULTIFACTOR AUTHENTICATION protect your applications from cyberattacks with the help of MFA /

Avoid MFA pitfalls--learn how to choose, implement, and troubleshoot MFA in your company Key Features Gain proficiency in using solutions like Okta, Ping Identity, and ForgeRock within the IAM domain Thwart authentication breaches using pragmatic strategies and lessons derived from real-world scenar...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: FANTI, MARCO
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : PACKT PUBLISHING LIMITED, 2023.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1381742943
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 230612s2023 enk o 000 0 eng d
040 |a YDX  |b eng  |c YDX  |d UKMGB  |d ORMDA  |d OCLCF  |d EBLCP  |d OCLCQ  |d UPM  |d IEEEE  |d OCLCO 
015 |a GBC2M1077  |2 bnb 
016 7 |a 020834004  |2 Uk 
019 |a 1382696077 
020 |a 9781803240589  |q (electronic bk.) 
020 |a 180324058X  |q (electronic bk.) 
020 |z 1803246960 
020 |z 9781803246963 
029 1 |a UKMGB  |b 020834004 
035 |a (OCoLC)1381742943  |z (OCoLC)1382696077 
037 |a 9781803240589  |b Packt Publishing Limited 
037 |a 9781803246963  |b O'Reilly Media 
037 |a 10251287  |b IEEE 
050 4 |a QA76.9.A25 
082 0 4 |a 005.83  |2 23/eng/20230711 
049 |a UAMI 
100 1 |a FANTI, MARCO. 
245 1 0 |a IMPLEMENTING MULTIFACTOR AUTHENTICATION  |h [electronic resource] :  |b protect your applications from cyberattacks with the help of MFA /  |c Marco Fanti. 
250 |a 1st edition. 
260 |a Birmingham, UK :  |b PACKT PUBLISHING LIMITED,  |c 2023. 
300 |a 1 online resource 
336 |a text  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
505 0 |a Table of ContentsOn the Internet, Nobody Knows You're a DogWhen to Use Different Types of MFAPreventing 99.9% of Attacks -- MFA with Azure AD and DuoImplementing Workforce and Customer Authentication Using OktaAccess Management with ForgeRock and Behavioral BiometricsFederated SSO with PingFederate and 1KosmosMFA and the Cloud -- Using MFA with Amazon Web ServicesGoogle Cloud Platform and MFAMFA without Commercial Products -- Doing it All Yourself with KeycloakImplementing MFA in the Real WorldThe Future of (Multi-Factor) Authentication. 
520 |a Avoid MFA pitfalls--learn how to choose, implement, and troubleshoot MFA in your company Key Features Gain proficiency in using solutions like Okta, Ping Identity, and ForgeRock within the IAM domain Thwart authentication breaches using pragmatic strategies and lessons derived from real-world scenarios Choose the right MFA solutions to enhance your organization's security Book Description MFA has emerged as an essential defense strategy in the wide-ranging landscape of cybersecurity. This book is a comprehensive manual that assists you in picking, implementing, and resolving issues with various authentication products that support MFA. It will guide you to bolster application security without sacrificing the user experience. You'll start with the fundamentals of authentication and the significance of MFA to familiarize yourself with how MFA works and the various types of solutions currently available. As you progress through the chapters, you'll learn how to choose the proper MFA setup to provide the right combination of security and user experience. The book then takes you through methods hackers use to bypass MFA and measures to safeguard your applications. After familiarizing yourself with enabling and managing leading cloud and on-premise MFA solutions, you'll see how MFA efficiently curbs cyber threats, aided by insights from industry best practices and lessons from real-world experiences. Finally, you'll explore the significance of innovative advancements in this domain, including behavioral biometrics and passkeys. By the end of the book, you'll have the knowledge to secure your workforce and customers, empowering your organization to combat authentication fraud. What you will learn Evaluate the advantages and limitations of MFA methods in use today Choose the best MFA product or solution for your security needs Deploy and configure the chosen solution for maximum effectiveness Identify and mitigate problems associated with different MFA solutions Reduce UX friction with ForgeRock and behavioral biometrics Stay informed about technologies and future trends in the field Who this book is for This book is for developers, system administrators, security professionals, white-hat hackers, CISOs, and anyone interested in understanding and enhancing their access management infrastructure. While basic knowledge of authentication and IAM is helpful, it is not a prerequisite. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computers  |x Access control. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 7 |a Computers  |x Access control  |2 fast 
776 0 8 |i Print version:  |z 9781803240589 
776 0 8 |i Print version:  |z 1803246960  |z 9781803246963  |w (OCoLC)1329425985 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781803246963/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 305516634 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30589653 
994 |a 92  |b IZTAP