Mechanics of User Identification and Authentication: Fundamentals of Identity Management


Product Description
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts of selecting one authentication mechanism or another? Introducing key concepts, Mechanics of User Identification and Authentication: Fundamentals of Identity Management outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth, yet accessible manner. It examines today's security landscape and the specific threats to user authentication. The book then outlines the process of controlled access to resources and discusses the types of user credentials that can be presented as proof of identity prior to accessing a computer system. It also contains an overview on cryptography that includes the essential approaches and terms required for understanding how user authentication works. This book provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is illustrated with a specific authentication scenario.Mechanics of User Identification and Authentication: Fundamentals of Identity Management Review
If you are a practicing security professional, buy this book! Todorov has spent a lot of time in the lab working through how our authentication technologies work and offers clear descriptions and sage advice on how they actually work and should be used in practice.This is not a rehash of vendor documentation and RFCs but a real look "under the covers" at a core capability our security infrastructure must support.
It's probably not a book you'll read from cover to cover as it's too detailed. But I would strongly encourage you to read the indtroductory material and then dip into the chapters dealing with the particular methods you use (or are thinking about using) in your own work.
Then place the book on your shelf as a ready reference when you need a well-organized reference to a particular technology.
Most of the consumer Reviews tell that the "Mechanics of User Identification and Authentication: Fundamentals of Identity Management" are high quality item. You can read each testimony from consumers to find out cons and pros from Mechanics of User Identification and Authentication: Fundamentals of Identity Management ...

No comments:
Post a Comment