top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto / / Roger A Grimes
Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto / / Roger A Grimes
Autore Grimes Roger A.
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , [2020]
Descrizione fisica 1 online resource (275 pages)
Disciplina 005.82
Soggetto topico Data encryption (Computer science)
Cryptography
Quantum computing
ISBN 1-119-61822-3
1-119-61823-1
1-119-61821-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910554876603321
Grimes Roger A.  
Hoboken, New Jersey : , : Wiley, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto / / Roger A Grimes
Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto / / Roger A Grimes
Autore Grimes Roger A.
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , [2020]
Descrizione fisica 1 online resource (275 pages)
Disciplina 005.82
Soggetto topico Data encryption (Computer science)
Cryptography
Quantum computing
ISBN 1-119-61822-3
1-119-61823-1
1-119-61821-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910816960703321
Grimes Roger A.  
Hoboken, New Jersey : , : Wiley, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hacking multifactor authentication / / Roger A. Grimes
Hacking multifactor authentication / / Roger A. Grimes
Autore Grimes Roger A.
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , [2021]
Descrizione fisica 1 online resource
Disciplina 005.8
Soggetto topico Computers - Access control
ISBN 1-119-65080-1
1-119-67235-X
1-119-67234-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910555176203321
Grimes Roger A.  
Indianapolis, Indiana : , : Wiley, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hacking multifactor authentication / / Roger A. Grimes
Hacking multifactor authentication / / Roger A. Grimes
Autore Grimes Roger A.
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , [2021]
Descrizione fisica 1 online resource
Disciplina 005.8
Soggetto topico Hacking
Hackers
Cryptography
Computers - Access control - Testing
Computer networks - Security measures
Computer security
ISBN 1-119-65080-1
1-119-67235-X
1-119-67234-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Who This Book Is For -- What Is Covered in This Book? -- MFA Is Good -- How to Contact Wiley or the Author -- Part I Introduction -- Chapter 1 Logon Problems -- It's Bad Out There -- The Problem with Passwords -- Password Basics -- Identity -- The Password -- Password Registration -- Password Complexity -- Password Storage -- Password Authentication -- Password Policies -- Passwords Will Be with Us for a While -- Password Problems and Attacks -- Password Guessing
Password Hash Cracking -- Password Stealing -- Passwords in Plain View -- Just Ask for It -- Password Hacking Defenses -- MFA Riding to the Rescue? -- Summary -- Chapter 2 Authentication Basics -- Authentication Life Cycle -- Identity -- Authentication -- Authorization -- Accounting/Auditing -- Standards -- Laws of Identity -- Authentication Problems in the Real World -- Summary -- Chapter 3 Types of Authentication -- Personal Recognition -- Knowledge-Based Authentication -- Passwords -- PINS -- Solving Puzzles -- Password Managers -- Single Sign-Ons and Proxies -- Cryptography -- Encryption
Public Key Infrastructure -- Hashing -- Hardware Tokens -- One-Time Password Devices -- Physical Connection Devices -- Wireless -- Phone-Based -- Voice Authentication -- Phone Apps -- SMS -- Biometrics -- FIDO -- Federated Identities and APIs -- OAuth -- APIs -- Contextual/Adaptive -- Less Popular Methods -- Voiceover Radio -- Paper-Based -- Summary -- Chapter 4 Usability vs. Security -- What Does Usability Mean? -- We Don't Really Want the Best Security -- Security Isn't Usually Binary -- Too Secure -- Seven-Factor MFA -- Moving ATM Keypad Numbers -- Not as Worried as You Think About Hacking
Unhackable Fallacy -- Unbreakable Oracle -- DJB -- Unhackable Quantum Cryptography -- We Are Reactive Sheep -- Security Theater -- Security by Obscurity -- MFA Will Cause Slowdowns -- MFA Will Cause Downtime -- No MFA Solution Works Everywhere -- Summary -- Part II Hacking MFA -- Chapter 5 Hacking MFA in General -- MFA Dependency Components -- Enrollment -- User -- Devices/Hardware -- Software -- API -- Authentication Factors -- Authentication Secrets Store -- Cryptography -- Technology -- Transmission/Network Channel -- Namespace -- Supporting Infrastructure -- Relying Party
Federation/Proxies -- Alternate Authentication Methods/Recovery -- Migrations -- Deprovision -- MFA Component Conclusion -- Main Hacking Methods -- Technical Attacks -- Human Element -- Physical -- Two or More Hacking Methods Used -- "You Didn't Hack the MFA!" -- How MFA Vulnerabilities Are Found -- Threat Modeling -- Code Review -- Fuzz Testing -- Penetration Testing -- Vulnerability Scanning -- Human Testing -- Accidents -- Summary -- Chapter 6 Access Control Token Tricks -- Access Token Basics -- Access Control Token General Hacks -- Token Reproduction/Guessing -- Token Theft
Record Nr. UNINA-9910677231703321
Grimes Roger A.  
Indianapolis, Indiana : , : Wiley, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hacking the hacker / / Roger A Grimes
Hacking the hacker / / Roger A Grimes
Autore Grimes Roger A.
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2017
Descrizione fisica 1 online resource (323 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer security
Hacking
ISBN 1-119-39626-3
1-119-39623-9
1-119-39622-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto What type of hacker are you? -- How hackers hack -- Profile: Bruce Schneier -- Social engineering -- Profile: Kevin Mitnick -- Software vulnerabilities -- Profile: Michael Howard -- Profile: Gary McGraw -- Malware -- Profile: Susan Bradley -- Profile: Mark Russinovich -- Cryptography -- Profile: Martin Hellman -- Intrusion detection/APTs -- Profile: Dr. Dorothy E. Denning -- Profile: Michael Dubinsky -- Firewalls -- Profile: William Cheskwick -- Honeypots -- Profile: Lance Spitzner -- Password hacking -- Profile: Dr. Cormac Herley -- Wireless hacking -- Profile: Thomas d'Otreppe de Bouvette -- Penetration testing -- Profile: Aaron Higbee -- Profile: Benild Joseph -- DDoS attacks -- Profile: Brian Krebs -- Secure OS -- Profile: Joanna Rutkowska -- Profile: Aaron Margosis -- Network attacks -- Profile: Laura Chappell -- IoT hacking -- Profile: Dr. Charlie Miller -- Policy and strategy -- Profile: Jing de Jong-Chen -- Threat modeling -- Profile: Adam Shostack -- Computer security education -- Profile: Stephen Northcutt -- Privacy -- Profile: Eva Galperin -- Patching -- Profile: Window Snyder -- Writing as a career -- Profile: Fahmida Y. Rashid -- Guide for parents with young hackers -- Hacker code of ethics.
Record Nr. UNINA-9910271016503321
Grimes Roger A.  
Indianapolis, Indiana : , : Wiley, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui