Skip to content
Scan a barcode
Scan
Paperback Authentication: From Passwords to Public Keys Book

ISBN: 0201615991

ISBN13: 9780201615999

Authentication: From Passwords to Public Keys

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Very Good

$6.19
Save $48.80!
List Price $54.99
Almost Gone, Only 1 Left!

Book Overview

This volume examines techniques for contemporary authentication methods for computer access control and security passwords, and also looks at how to choose the best authentication method for any given... This description may be from another edition of this product.

Customer Reviews

5 ratings

Amazing compilation of the Authentication Methods!

It's a must for anyone who needs to have a deep and clear understanding of the world of the authentication.I'm a research assistant, having finished my Master of Sciences in Electronic Commerce (2003) in the Department of Computer Science and Operations Research at Université de Montréal (Montreal (QC) Canada) and who has written a master's thesis called "ASEMC-Authentication for a SEcure M-Commerce". The book has brought me great contributions in a very clear language even if it is a technical matter. It makes extensive use of pictures, schemas, and graphs that allow us easily understand the authentication methods. Actually, it makes use of the visual intelligence of each one of us!

Masterful writing and in-depth treatment of the subject

I'm in complete agreement with the previous reviewers that this book is easy to read and that it clearly explains complex material. What I like is the way the author integrates theory, application and the human side of authentication. For example, he makes excellent use of tables to distill and display information, such as summary tables for attacks and defenses that are cross-referenced to each other. This is particularly useful to anyone who is developing security profiles, and the thorough and meticulous way that the author summarizes the information reduces the attack-defense pairings to the essentials. His clear explanations of authentication methods and their underlying technologies, as well as how they evolved, are among the clearest in print. More importantly, he goes beyond explaining the mathematics behind the protocols by also showing how assumptions can lead to exposures. An example is the 4-digit lock, which has 10,000 possible combinations. At first glance it would seem that you have a 1-in-10000 chance of guessing the combination. However, he goes on to explain that a study showed 50% of people chose a calendar date for the combination, then leads you through the math of showing why you have approximately 1-in-512 chance of breaking the combination on the first try. He uses similar techniques throughout the book, which makes you think in real-world terms. It's his treatment of the people side of the authentication techniques that add to the real-world approach. I also thought that the chapter on picking PINs and passwords was exceptional. I've written password management policies and procedures for a number of clients in recent years and thought I was an expert. After reading this 37-page chapter I discovered what I didn't know - and it was a lot! Each chapter is filled with facts that you may have or have not considered, and each is filled with common sense, backed up with the math or technical underpinnings. Moreover, the book complete covers authentication and will get anyone quickly up-to-speed on the basics and many of the finer points. This book is especially important as a resource to anyone who is involved in health care because the material is directly applicable to requirements set forth in HIPAA. It is also essential reading for anyone who develops or manages security in a web- or e-commerce environment because of the dependencies upon the technologies and methods that are discussed in this book. IT security specialists will also find this book to be an invaluable resource, especially the parts that cover password management, social engineering and practical applications of authentication.

Everything you need to know about authentication

Authentication is one of the 4 pillars of information security(authorization, confidentiality and integrity being the other three); but very little has directly been written directly on the topic outside of the academic community; until this book.Authentication: From Passwords to Public Keys is an excellent work that covers all of the direct areas of authentication. Authentication is a huge challenge in that most users would prefer to have their passwords short and easy to remember, which is exactly what a password should not be.Even if there were a lot of other books available on the subject, Authentication: From Passwords to Public Keys still would be required reading.

Really Enjoyed Reading It!

There is no other way to put it -- this is an excellent book. Not only does Mr. Smith give us a detailed analysis of the major authentication protocols that are used in today's IT environment, but he also points out the relative strengths and weaknesses for each protocol. This is really important stuff to know -- all too often the marketing hype for systems such as PKI, biometrics, Kerberos, strong passwords, etc would lead one to believe that each of these solutions offers a bullet-proof approach to authentication security. It isn't to say that any of the protocols covered in this book are inadequate, but it is important to understand how each of them can be subverted so that one can intelligently weigh the risks of compromise before implementing a specific protocol.Add to that that this is a really enjoyable book to read -- that makes it worth the purchase price and the time to read it.

An Easy to Read and Informative Look at Authentication

Prior to reading this book it appeared to me as though there was an endless supply of Authentication methods, none of which I could distinguish between in any practical sense. I have talked with vendors of biometric solutions, token solutions, software certificate solutions, and full blown PKI solutions and each one will tell you how there solutions is more secure, scalable, and cost effective then all other methods and until now I have been unable to find an objective and informative source of information as to the strengths and weakness of each product. After reading Richard Smiths "Authentication: From Passwords to Public Keys" I now feel like I have enough information to return to the vendors of these product and distinguish fact from fiction. In addition to empowering me, believe it or not the book was actually fun to read. I do not have an overly technical background but the book was never over my head. There was enough detail to challenge and expand my current level of understanding but not so much that it bogged me down in technical jargon. Interesting stories littered throughout the book put the technologies in historical perspective and give the reader a better understanding of the evolution of Authentication while at the same time driving the book forward, which ultimately makes it a fairly quick read.All in all I have to say I was extremely impressed with the way Richard Smith has tackled this subject and would encourage people interested in security or authentication to read "Authentication: From Passwords to Public Keys."
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured