Millions of books in English, Spanish and other languages. Free UK delivery 

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFA
Type
Physical Book
Language
Inglés
Pages
550
Format
Paperback
Dimensions
23.5 x 19.1 x 2.8 cm
Weight
0.93 kg.
ISBN13
9781803246963

Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFA

Marco Fanti (Author) · Packt Publishing · Paperback

Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFA - Fanti, Marco

New Book

£ 35.97

  • Condition: New
Origin: U.S.A. (Import costs included in the price)
It will be shipped from our warehouse between Friday, July 26 and Friday, August 02.
You will receive it anywhere in United Kingdom between 1 and 3 business days after shipment.

Synopsis "Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFA"

Avoid MFA pitfalls-learn how to choose, implement, and troubleshoot MFA in your companyPurchase of the print or Kindle book includes a free PDF eBookKey Features: Gain proficiency in using solutions like Okta, Ping Identity, and ForgeRock within the IAM domainThwart authentication breaches using pragmatic strategies and lessons derived from real-world scenariosChoose the right MFA solutions to enhance your organization's securityBook Description: MFA has emerged as an essential defense strategy in the wide-ranging landscape of cybersecurity. This book is a comprehensive manual that assists you in picking, implementing, and resolving issues with various authentication products that support MFA. It will guide you to bolster application security without sacrificing the user experience.You'll start with the fundamentals of authentication and the significance of MFA to familiarize yourself with how MFA works and the various types of solutions currently available. As you progress through the chapters, you'll learn how to choose the proper MFA setup to provide the right combination of security and user experience. The book then takes you through methods hackers use to bypass MFA and measures to safeguard your applications. After familiarizing yourself with enabling and managing leading cloud and on-premise MFA solutions, you'll see how MFA efficiently curbs cyber threats, aided by insights from industry best practices and lessons from real-world experiences. Finally, you'll explore the significance of innovative advancements in this domain, including behavioral biometrics and passkeys.By the end of the book, you'll have the knowledge to secure your workforce and customers, empowering your organization to combat authentication fraud.What You Will Learn: Evaluate advantages and limitations of MFA methodsWork with advanced authentication methods including passkeys and WebAuthnImplement and fine-tune popular cloud-based and on-premises solutionsChoose the best MFA solution for your security needsReduce UX friction with behavioral biometricsStay informed about technologies and future trends in the fieldWho this book is for: This book is for developers, system administrators, security professionals, white-hat hackers, CISOs, and anyone interested in understanding and enhancing their access management infrastructure. While basic knowledge of authentication and IAM is helpful, it is not a prerequisite.

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews