Commencez à lire Mechanics of User Identification and Authentication sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible
 

Mechanics of User Identification and Authentication: Fundamentals of Identity Management [Format Kindle]

Dobromir Todorov

Prix conseillé : EUR 103,12 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 101,46
Prix Kindle : EUR 64,55 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 36,91 (36%)

App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 64,55  
Relié EUR 92,22  





Descriptions du produit

Présentation de l'éditeur

User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts of selecting one authentication mechanism or another?

Introducing key concepts, Mechanics of User Identification and Authentication: Fundamentals of Identity Management outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth, yet accessible manner. It examines today's security landscape and the specific threats to user authentication. The book then outlines the process of controlled access to resources and discusses the types of user credentials that can be presented as proof of identity prior to accessing a computer system. It also contains an overview on cryptography that includes the essential approaches and terms required for understanding how user authentication works.

This book provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is illustrated with a specific authentication scenario.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 7235 KB
  • Nombre de pages de l'édition imprimée : 760 pages
  • Editeur : Auerbach Publications (18 juin 2007)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B001D4M52S
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Classement des meilleures ventes d'Amazon: n°499.476 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.2 étoiles sur 5  6 commentaires
3 internautes sur 4 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Security professional? Read this book! 18 mars 2008
Par A. Student - Publié sur Amazon.com
Format:Relié
If you are a practicing security professional, buy this book! Todorov has spent a lot of time in the lab working through how our authentication technologies work and offers clear descriptions and sage advice on how they actually work and should be used in practice.

This is not a rehash of vendor documentation and RFCs but a real look "under the covers" at a core capability our security infrastructure must support.

It's probably not a book you'll read from cover to cover as it's too detailed. But I would strongly encourage you to read the indtroductory material and then dip into the chapters dealing with the particular methods you use (or are thinking about using) in your own work.

Then place the book on your shelf as a ready reference when you need a well-organized reference to a particular technology.
4.0 étoiles sur 5 Technology Layer Approach to Authentication 20 avril 2010
Par G. Warren - Publié sur Amazon.com
Format:Relié|Achat vérifié
I apply Enterprize Architecture techniques to my work and in short this considers the interlinking importance of business, information, applications, and technology in any analysis. Mechanics of User Identication and Authentication is firmly in the technology layer with some overlap in the application layer. It includes considerable depth in this area not only based on its 726 page count but also in the considerable detail provided and therefore provides a high degree of value for the dollar. If you are looking for one identity management technical reference book then you should consider this one. However if you are looking for an introductory book in identity management then this book is not for you. It offers separate chapters on UNIX and Windows and subsequent chapters drill into considerable detail into other authentication and related protocols. I do not have the knowledge to comment on the technical accuracy of this book but it will be the first one I reach for as my identity management project proceeds.
2 internautes sur 3 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Finally some has presented the fundamentals 13 décembre 2007
Par Aussie in London - Publié sur Amazon.com
Format:Relié
Recommended for all Administrators and Designers of IT Infrastructures!!!
I must say this book is well worth the read and for me has taken its place on the bookshelf along side other bibles of Networking (Routing TCP/IP v1 and v2 - Jeff Doyle). As a forgotten area of many Infrastructures - where most people look simply to vendor recommendations, without fully understanding what it is they are implementing (or recommending to others)- finally someone has written a book that explores the mechanics of the many different authentication methods available on the market today. Whether it be UNIX, Windows, TACACS+, RADIUS or SSL, now I have one place to look for the technical details.
5.0 étoiles sur 5 Awesome Reference! 11 février 2011
Par odoyle189 - Publié sur Amazon.com
Format:Relié
This is a great reference book for those in the IT field. This really helps develop an understanding of how authentication technologies work under the hood in a clear and concise manner. There really aren't many other sources out that explain the amount of technologies covered in this book...

To those who say this is old, the computer security field is too fast paced to keep up with! Read this book so you develop an understanding of how the technologies operate under the hood and it will be easier to understand the new stuff.

Mr. Todorov, I tip my hat to you! Thanks!
2 internautes sur 4 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Mechanics of User Identification and Authentication Fundamentals of Identity Management 9 janvier 2008
Par Yuval Sinay - Publié sur Amazon.com
Format:Relié
The book "Mechanics of User Identification and Authentication Fundamentals of Identity Management" Provides a good baseline and framework for any junior security expert and can also improve the knowledgebase of regular IT person.
Although the information in this book doesn't provide the "latest news" - In the technology field, the current news usually can be considered as an old news.
So the conclusion is simple: Start from the basis and move forward.
After obtaining a good baseline, learning a new information will be more
easier.
I hope that the new edition of this book will be published with a Paperback so the book price will be dropped and from my point of view,
it's more easier to learn from a Paperback books.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique