Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized ‘crackers’ to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today’s computer cryptography is a rock-solid way …
TABLE OF CONTENTS Introduction xxv Who This Book is For xxvii What is Covered in This Book? xxvii MFA is Good xxx How to Contact Wiley or the Author xxxi Part I Introduction 1 1 Logon Problems 3 2 Authentication Basics 33 3 Types of Authentication 59 4 Usability vs Security 101 Part II Hacking MFA 121 5 Hacking MFA in General 123 6 Access Control Token Tricks 141 7 Endpoint …