Mechanics of user identification and authentication - Info and Reading Options
By Dobromir Todorov

“Mechanics of user identification and authentication” Metadata:
- Title: ➤ Mechanics of user identification and authentication
- Author: Dobromir Todorov
“Mechanics of user identification and authentication” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Computer networks - Security measures - Computers - Access control - Computer security - Computer networks, security measures - Computers, access control - Authentication - Computer Security - Réseaux d'ordinateurs - Sécurité - Mesures - Ordinateurs - Accès - Contrôle - Sécurité informatique - Systèmes d'exploitation (Ordinateurs) - Authentification - COMPUTERS - Internet - Security - Networking - General - Authentifikation - Computersicherheit - Zugriffskontrolle
Edition Identifiers:
- The Open Library ID: OL8777419W
AI-generated Review of “Mechanics of user identification and authentication”:
"Mechanics of user identification and authentication" Description:
The Open Library:
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts of selecting one authentication mechanism or another? Introducing key concepts, Mechanics of User Identification and Authentication: Fundamentals of Identity Management outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth, yet accessible manner. It examines today's security landscape and the specific threats to user authentication. The book then outlines the process of controlled access to resources and discusses the types of user credentials that can be presented as proof of identity prior to accessing a computer system. It also contains an overview on cryptography that includes the essential approaches and terms required for understanding how user authentication works. This book provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is illustrated with a specific authentication scenario.
Read “Mechanics of user identification and authentication”:
Read “Mechanics of user identification and authentication” by choosing from the options below.
Search for “Mechanics of user identification and authentication” downloads:
Visit our Downloads Search page to see if downloads are available.
Find “Mechanics of user identification and authentication” in Libraries Near You:
Read or borrow “Mechanics of user identification and authentication” from your local library.
- The WorldCat Libraries Catalog: Find a copy of “Mechanics of user identification and authentication” at a library near you.
Buy “Mechanics of user identification and authentication” online:
Shop for “Mechanics of user identification and authentication” on popular online marketplaces.
- Ebay: New and used books.