Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto / / Roger A Grimes |
Autore | Grimes Roger A. |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , [2020] |
Descrizione fisica | 1 online resource (275 pages) |
Disciplina | 005.82 |
Soggetto topico |
Data encryption (Computer science)
Cryptography Quantum computing |
ISBN |
1-119-61822-3
1-119-61823-1 1-119-61821-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910554876603321 |
Grimes Roger A. | ||
Hoboken, New Jersey : , : Wiley, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto / / Roger A Grimes |
Autore | Grimes Roger A. |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , [2020] |
Descrizione fisica | 1 online resource (275 pages) |
Disciplina | 005.82 |
Soggetto topico |
Data encryption (Computer science)
Cryptography Quantum computing |
ISBN |
1-119-61822-3
1-119-61823-1 1-119-61821-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910816960703321 |
Grimes Roger A. | ||
Hoboken, New Jersey : , : Wiley, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hacking multifactor authentication / / Roger A. Grimes |
Autore | Grimes Roger A. |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , [2021] |
Descrizione fisica | 1 online resource |
Disciplina | 005.8 |
Soggetto topico | Computers - Access control |
ISBN |
1-119-65080-1
1-119-67235-X 1-119-67234-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910555176203321 |
Grimes Roger A. | ||
Indianapolis, Indiana : , : Wiley, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hacking multifactor authentication / / Roger A. Grimes |
Autore | Grimes Roger A. |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , [2021] |
Descrizione fisica | 1 online resource |
Disciplina | 005.8 |
Soggetto topico |
Hacking
Hackers Cryptography Computers - Access control - Testing Computer networks - Security measures Computer security |
ISBN |
1-119-65080-1
1-119-67235-X 1-119-67234-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Introduction -- Who This Book Is For -- What Is Covered in This Book? -- MFA Is Good -- How to Contact Wiley or the Author -- Part I Introduction -- Chapter 1 Logon Problems -- It's Bad Out There -- The Problem with Passwords -- Password Basics -- Identity -- The Password -- Password Registration -- Password Complexity -- Password Storage -- Password Authentication -- Password Policies -- Passwords Will Be with Us for a While -- Password Problems and Attacks -- Password Guessing
Password Hash Cracking -- Password Stealing -- Passwords in Plain View -- Just Ask for It -- Password Hacking Defenses -- MFA Riding to the Rescue? -- Summary -- Chapter 2 Authentication Basics -- Authentication Life Cycle -- Identity -- Authentication -- Authorization -- Accounting/Auditing -- Standards -- Laws of Identity -- Authentication Problems in the Real World -- Summary -- Chapter 3 Types of Authentication -- Personal Recognition -- Knowledge-Based Authentication -- Passwords -- PINS -- Solving Puzzles -- Password Managers -- Single Sign-Ons and Proxies -- Cryptography -- Encryption Public Key Infrastructure -- Hashing -- Hardware Tokens -- One-Time Password Devices -- Physical Connection Devices -- Wireless -- Phone-Based -- Voice Authentication -- Phone Apps -- SMS -- Biometrics -- FIDO -- Federated Identities and APIs -- OAuth -- APIs -- Contextual/Adaptive -- Less Popular Methods -- Voiceover Radio -- Paper-Based -- Summary -- Chapter 4 Usability vs. Security -- What Does Usability Mean? -- We Don't Really Want the Best Security -- Security Isn't Usually Binary -- Too Secure -- Seven-Factor MFA -- Moving ATM Keypad Numbers -- Not as Worried as You Think About Hacking Unhackable Fallacy -- Unbreakable Oracle -- DJB -- Unhackable Quantum Cryptography -- We Are Reactive Sheep -- Security Theater -- Security by Obscurity -- MFA Will Cause Slowdowns -- MFA Will Cause Downtime -- No MFA Solution Works Everywhere -- Summary -- Part II Hacking MFA -- Chapter 5 Hacking MFA in General -- MFA Dependency Components -- Enrollment -- User -- Devices/Hardware -- Software -- API -- Authentication Factors -- Authentication Secrets Store -- Cryptography -- Technology -- Transmission/Network Channel -- Namespace -- Supporting Infrastructure -- Relying Party Federation/Proxies -- Alternate Authentication Methods/Recovery -- Migrations -- Deprovision -- MFA Component Conclusion -- Main Hacking Methods -- Technical Attacks -- Human Element -- Physical -- Two or More Hacking Methods Used -- "You Didn't Hack the MFA!" -- How MFA Vulnerabilities Are Found -- Threat Modeling -- Code Review -- Fuzz Testing -- Penetration Testing -- Vulnerability Scanning -- Human Testing -- Accidents -- Summary -- Chapter 6 Access Control Token Tricks -- Access Token Basics -- Access Control Token General Hacks -- Token Reproduction/Guessing -- Token Theft |
Record Nr. | UNINA-9910677231703321 |
Grimes Roger A. | ||
Indianapolis, Indiana : , : Wiley, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hacking the hacker / / Roger A Grimes |
Autore | Grimes Roger A. |
Edizione | [1st edition] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2017 |
Descrizione fisica | 1 online resource (323 pages) : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Hacking |
ISBN |
1-119-39626-3
1-119-39623-9 1-119-39622-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | What type of hacker are you? -- How hackers hack -- Profile: Bruce Schneier -- Social engineering -- Profile: Kevin Mitnick -- Software vulnerabilities -- Profile: Michael Howard -- Profile: Gary McGraw -- Malware -- Profile: Susan Bradley -- Profile: Mark Russinovich -- Cryptography -- Profile: Martin Hellman -- Intrusion detection/APTs -- Profile: Dr. Dorothy E. Denning -- Profile: Michael Dubinsky -- Firewalls -- Profile: William Cheskwick -- Honeypots -- Profile: Lance Spitzner -- Password hacking -- Profile: Dr. Cormac Herley -- Wireless hacking -- Profile: Thomas d'Otreppe de Bouvette -- Penetration testing -- Profile: Aaron Higbee -- Profile: Benild Joseph -- DDoS attacks -- Profile: Brian Krebs -- Secure OS -- Profile: Joanna Rutkowska -- Profile: Aaron Margosis -- Network attacks -- Profile: Laura Chappell -- IoT hacking -- Profile: Dr. Charlie Miller -- Policy and strategy -- Profile: Jing de Jong-Chen -- Threat modeling -- Profile: Adam Shostack -- Computer security education -- Profile: Stephen Northcutt -- Privacy -- Profile: Eva Galperin -- Patching -- Profile: Window Snyder -- Writing as a career -- Profile: Fahmida Y. Rashid -- Guide for parents with young hackers -- Hacker code of ethics. |
Record Nr. | UNINA-9910271016503321 |
Grimes Roger A. | ||
Indianapolis, Indiana : , : Wiley, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|