00872nam0-22002771i-450-99000736822040332120021113000736822FED01000736822(Aleph)000736822FED0100073682220021114d1950----km-y0itay50------baengUSy-------001yy<<The >>origins and history of the proconsular and the propraetorian imperium to 27 b.C.W. F. JashemskiChicagoUniversity of Chicago Press1950174 p.24 cmJashemski,Wilhelmina Mary Feemster266180ITUNINARICAUNIMARCBK990007368220403321IV H 6239251FGBCFGBCOrigins and history of the proconsular and the propraetorian imperium to 27 b.C693355UNINA03366nam 2200529zu 450 991049594700332120210807000350.02-8218-4565-010.4000/books.ifea.1685(CKB)4340000000013466(SSID)ssj0001537314(PQKBManifestationID)11884267(PQKBTitleCode)TC0001537314(PQKBWorkID)11518402(PQKB)11785502(WaSeSS)IndRDA00044631(FrMaCLE)OB-ifea-1685(PPN)182825108(EXLCZ)99434000000001346620160829d1986 uy spaur|||||||||||txtccrEstados y naciones en los Andes : Hacia una historia comparativa : Bolivia, Colombia, Ecuador, Perú[Place of publication not identified]Institut français d'études andines Instituto de Estudios Peruanos19861 online resource (668 pages)Travaux de l'IFÉA ;33Bibliographic Level Mode of Issuance: MonographEste libro reúne un conjunto de estudios que enfocan, desde distintas perspectivas y de manera renovadora, los problemas que atañen a la formación de los Estados-Naciones en los andes. Colaboran en el volumen destacados investigadores que desarrollan estudios antropológicos, sociológicos e históricos en los países andinos. Partiendo de perspectivas regionales, que privilegian las dinámicas de corta duración, las tensiones coyunturales, los movimientos sociales y sus actores; bolivianos, colombianos, ecuatorianos, peruanos y franceses se reunieron para debatir, desde esa base rica de reconstrucciones regionales y coyunturales, sobre un eje de reflexión: La formación de Estados- Naciones en sociedades pluriétnicas a lo largo del siglo y medio de historia post-colonial. Los textos aquí presentados, así como la síntesis de los debates, permitirán a los estudiosos de una é-poca poco conocida acercarse a una base referencial que ofrece, además, una impostergable perspectiva comparativa. En la formación de nuestras sociedades nacionales se estudian: permanencias y cambios sociales, el desarrollo de nuevos tipos de regionalidades y las respuestas a diferentes condiciones exteriores en el surgimiento del imperialismo moderno. En la cristalización de nuestros Estados-Naciones, los trabajos se detienen en un esfuerzo de caracterización y en el análisis de las ideologías y representaciones políticas. La combinación de perspectivas y el debate comparativo hacen de este volumen un aporte de consulta necesaria.Travaux de l'Institut français d'études andines ;33.Regions & Countries - AmericasHILCCHistory & ArchaeologyHILCCLatin AmericaHILCCAndes RegionHistorySouth AmericaHistory1830-Regions & Countries - AmericasHistory & ArchaeologyLatin AmericaDeler Jean Paul249935Saint-Geours YPQKBBOOK9910495947003321Estados y naciones en los Andes : Hacia una historia comparativa : Bolivia, Colombia, Ecuador, Perú2864338UNINA05792nam 2200649 450 991067723170332120210608112544.01-119-65080-11-119-67235-X1-119-67234-110.1002/9781119672357(CKB)4100000011470063(MiAaPQ)EBC6357201(OCoLC-P)1198019471(PPN)272709255(OCoLC)1198019471(CaSebORM)9781119650799(EXLCZ)99410000001147006320210224d2021 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierHacking multifactor authentication /Roger A. GrimesIndianapolis, Indiana :Wiley,[2021]©20211 online resourceIncludes index.1-119-65079-8 Introduction -- Who This Book Is For -- What Is Covered in This Book? -- MFA Is Good -- How to Contact Wiley or the Author -- Part I Introduction -- Chapter 1 Logon Problems -- It's Bad Out There -- The Problem with Passwords -- Password Basics -- Identity -- The Password -- Password Registration -- Password Complexity -- Password Storage -- Password Authentication -- Password Policies -- Passwords Will Be with Us for a While -- Password Problems and Attacks -- Password GuessingPassword Hash Cracking -- Password Stealing -- Passwords in Plain View -- Just Ask for It -- Password Hacking Defenses -- MFA Riding to the Rescue? -- Summary -- Chapter 2 Authentication Basics -- Authentication Life Cycle -- Identity -- Authentication -- Authorization -- Accounting/Auditing -- Standards -- Laws of Identity -- Authentication Problems in the Real World -- Summary -- Chapter 3 Types of Authentication -- Personal Recognition -- Knowledge-Based Authentication -- Passwords -- PINS -- Solving Puzzles -- Password Managers -- Single Sign-Ons and Proxies -- Cryptography -- EncryptionPublic Key Infrastructure -- Hashing -- Hardware Tokens -- One-Time Password Devices -- Physical Connection Devices -- Wireless -- Phone-Based -- Voice Authentication -- Phone Apps -- SMS -- Biometrics -- FIDO -- Federated Identities and APIs -- OAuth -- APIs -- Contextual/Adaptive -- Less Popular Methods -- Voiceover Radio -- Paper-Based -- Summary -- Chapter 4 Usability vs. Security -- What Does Usability Mean? -- We Don't Really Want the Best Security -- Security Isn't Usually Binary -- Too Secure -- Seven-Factor MFA -- Moving ATM Keypad Numbers -- Not as Worried as You Think About HackingUnhackable Fallacy -- Unbreakable Oracle -- DJB -- Unhackable Quantum Cryptography -- We Are Reactive Sheep -- Security Theater -- Security by Obscurity -- MFA Will Cause Slowdowns -- MFA Will Cause Downtime -- No MFA Solution Works Everywhere -- Summary -- Part II Hacking MFA -- Chapter 5 Hacking MFA in General -- MFA Dependency Components -- Enrollment -- User -- Devices/Hardware -- Software -- API -- Authentication Factors -- Authentication Secrets Store -- Cryptography -- Technology -- Transmission/Network Channel -- Namespace -- Supporting Infrastructure -- Relying PartyFederation/Proxies -- Alternate Authentication Methods/Recovery -- Migrations -- Deprovision -- MFA Component Conclusion -- Main Hacking Methods -- Technical Attacks -- Human Element -- Physical -- Two or More Hacking Methods Used -- "You Didn't Hack the MFA!" -- How MFA Vulnerabilities Are Found -- Threat Modeling -- Code Review -- Fuzz Testing -- Penetration Testing -- Vulnerability Scanning -- Human Testing -- Accidents -- Summary -- Chapter 6 Access Control Token Tricks -- Access Token Basics -- Access Control Token General Hacks -- Token Reproduction/Guessing -- Token Theft"Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That's right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions. You'll learn about the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book."HackingHackersCryptographyComputersAccess controlTestingComputer networksSecurity measuresComputer securityHacking.Hackers.Cryptography.ComputersAccess controlTesting.Computer networksSecurity measures.Computer security.005.8Grimes Roger A.1042670MiAaPQMiAaPQMiAaPQBOOK9910677231703321Hacking multifactor authentication3064335UNINA