Hardcover: 760 pages
Publisher: Auerbach Publications; 1 edition (June 18, 2007)
Language: English
ISBN-10: 1420052195
ISBN-13: 978-1420052190
Product Dimensions: 6.4 x 1.7 x 9.2 inches
Shipping Weight: 2.6 pounds (View shipping rates and policies)
Average Customer Review: 4.2 out of 5 stars See all reviews (6 customer reviews)
Best Sellers Rank: #896,058 in Books (See Top 100 in Books) #15 in Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > LDAP #402 in Books > Business & Money > Economics > Commerce #792 in Books > Computers & Technology > Networking & Cloud Computing > Network Security
If you are a practicing security professional, buy this book! Todorov has spent a lot of time in the lab working through how our authentication technologies work and offers clear descriptions and sage advice on how they actually work and should be used in practice.This is not a rehash of vendor documentation and RFCs but a real look "under the covers" at a core capability our security infrastructure must support.It's probably not a book you'll read from cover to cover as it's too detailed. But I would strongly encourage you to read the indtroductory material and then dip into the chapters dealing with the particular methods you use (or are thinking about using) in your own work.Then place the book on your shelf as a ready reference when you need a well-organized reference to a particular technology.
This is a great reference book for those in the IT field. This really helps develop an understanding of how authentication technologies work under the hood in a clear and concise manner. There really aren't many other sources out that explain the amount of technologies covered in this book...To those who say this is old, the computer security field is too fast paced to keep up with! Read this book so you develop an understanding of how the technologies operate under the hood and it will be easier to understand the new stuff.Mr. Todorov, I tip my hat to you! Thanks!
I apply Enterprize Architecture techniques to my work and in short this considers the interlinking importance of business, information, applications, and technology in any analysis. Mechanics of User Identication and Authentication is firmly in the technology layer with some overlap in the application layer. It includes considerable depth in this area not only based on its 726 page count but also in the considerable detail provided and therefore provides a high degree of value for the dollar. If you are looking for one identity management technical reference book then you should consider this one. However if you are looking for an introductory book in identity management then this book is not for you. It offers separate chapters on UNIX and Windows and subsequent chapters drill into considerable detail into other authentication and related protocols. I do not have the knowledge to comment on the technical accuracy of this book but it will be the first one I reach for as my identity management project proceeds.
Mechanics of User Identification and Authentication: Fundamentals of Identity Management Windows 10: The Ultimate User Guide for Advanced Users to Operate Microsoft Windows 10 (tips and tricks, user manual, user guide, updated and edited, Windows ... (windows,guide,general.guide,all Book 4) Writing Effective User Stories: As a User, I Can Express a Business Need in User Story Format To Get the IT Solution I Need Android XBMC Kodi 5 In 1 User Guide (Updated September 2016): Android Tablet, Phone & Google TV User Guide, XBMC Kodi & TV Streaming User Guide Echo: Echo Advanced User Guide (2016 Updated) : Step-by-Step Instructions to Enrich your Smart Life ( Echo User Manual, Alexa User Guide, Echo Dot, Echo Tap) Access Control, Authentication, And Public Key Infrastructure (Jones & Bartlett Learning Information Systems Security) Access Control, Authentication, And Public Key Infrastructure (Information Systems Security & Assurance) Autograph Collector Celebrity Autograph Authentication Guide: Authentic Examples of Over 1,000 Celebrity Autographs Biometric Authentication: A Machine Learning Approach Fundamentals of Nursing: Human Health and Function (Craven, Fundamentals of Nursing: Human Health and Functionraven, Fundamentals of Nurs) Computational Fluid Mechanics and Heat Transfer, Third Edition (Series in Computational and Physical Processes in Mechanics and Thermal Sciences) Reinforced Concrete: Mechanics and Design (4th Edition) (Civil Engineering and Engineering Mechanics) Robotics: The Beginner's Guide to Robotic Building, Technology, Mechanics, and Processes (Robotics, Mechanics, Technology, Robotic Building, Science) Soil Mechanics in Highway Engineering (Series on Rock and Soil Mechanics) Mechanics II: Mechanics of Materials + Fire Stick: The Complete User Manual To Starting With And Using Fire TV Stick, Plus Little-Known Tips And Tricks! (Streaming, How To Use Fire Stick, Fire TV Stick User Guide) Windows 10: The Ultimate Beginner's Guide How to Operate Microsoft Windows 10 (tips and tricks, user manual, user guide, updated and edited, Windows ... (windows,guide,general,guide,all) (Volume 3) Windows 10: The Ultimate Guide To Operate New Microsoft Windows 10 (tips and tricks, user manual, user guide, updated and edited, Windows for beginners) The Elements of User Experience: User-Centered Design for the Web and Beyond (2nd Edition) (Voices That Matter) Fire TV: The Best User Guide to Master Fire TV in 1 Hour (expert, Prime, tips and tricks, web services, home tv, digital media, echo) (user guides, internet)