Home > Store

Multi-Factor Authentication (MFA) Complete Guide

Register your product to gain access to bonus material or receive a coupon.

Multi-Factor Authentication (MFA) Complete Guide

eBook

  • This product currently is not for sale.
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Not for Sale

Description

  • Copyright 2024
  • Edition: 1st
  • eBook
  • ISBN-10: 0-13-762100-0
  • ISBN-13: 978-0-13-762100-2

With over 15 billion stolen credentials to work with, cybercriminals can hijack accounts, discover company secrets, compromise personal information and health care records, and steal virtually any high-value digital asset. To help deter cybersecurity disaster, more and more organizations rely on Multi-Factor Authentication (MFA). Now, there's a single source, vendor-neutral guide to today's leading MFA technologies, applications, best practices, and operations. Enterprise security experts James Hill and Ned Zaldivar reveal how MFA can prevent identity theft, unauthorized remote access, and other attacks, and guide you through configuring, operating and troubleshooting popular solutions across multiple use cases. You'll find proven techniques for integrating MFA into your current environment, leveraging MFA standards, using SMS and push notifications, and much more. A full chapter on biometrics introduces password-less systems, behavioral biometrics, WebAuthn, TouchID, and FaceID. Hill and Zaldivar present deployment best practices for on-premises, SaaS, and IaaS (Infrastructure as a Service), as well as troubleshooting techniques for DUO, Azure, and other platforms. Finally, to prepare you for the future, they offer an expert preview of emerging MFA technologies and issues.

Whatever your role in planning, deploying, or operating MFA, Multi-Factor Authentication (MFA) Complete Guide will help you protect your people, customers, and assets and sleep better at night.

Sample Content

Table of Contents

Introduction

1. Introduction to Multi-factor Authentication (MFA)

2. Security Risks Without MFA

3. With and Beyond MFA

4. Deep Dive: What You Have

5. Deep Dive on Biometrics

6. Deployment Best Practices

7. Troubleshooting

8. Future of MFA

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.