The Essential Guide to Understanding Password-Based Authentication The Essential Guide to Understanding Password-Based Authentication

The Essential Guide to Understanding Password-Based Authentication

Publisher Description

Even veteran IT pros don’t fully understand the authentication technologies used by Windows and other operating systems. With their deep knowledge of authentication protocols such as NTLM and Kerberos, hackers can steal your users' credentials and then secretly take your most valuable data. In this guide, Andy Green, a Digital Content Producer and security blogger at Varonis Systems, decodes hashing, encryption, challenge-response protocols, and other technologies underlying password-based authentication. Green also reviews the most common attacks, such as Pass the Hash, Dictionary, and Man in the Middle, which are used to subvert authentication checks. The guide is presented in an accessible Q and A format that will quickly give you the conceptual framework you’ll need to take on cyber thieves.

GENRE
Computing & Internet
RELEASED
2014
17 November
LANGUAGE
EN
English
LENGTH
18
Pages
PUBLISHER
Varonis Systems
SELLER
Varonis Systems, Inc.
SIZE
3
MB

More Books Like This

Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing
2019
How Cybersecurity Really Works How Cybersecurity Really Works
2021
How to Hack Like a Pornstar How to Hack Like a Pornstar
2017
Hacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux Hacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux
2022
Secrets and Lies Secrets and Lies
2011
A First Course In Ethical Hacking A First Course In Ethical Hacking
2013

More Books by Andy Green

Handbook of Global Education Policy Handbook of Global Education Policy
2016
Anatomy of a Phish Anatomy of a Phish
2014

Customers Also Bought

Hacked?! Hacked?!
2015
Cyber Security: It's Personal Cyber Security: It's Personal
2017
CyberSecurity for the Digitally Challenged CyberSecurity for the Digitally Challenged
2020
Beginner's Guide to Information Security Beginner's Guide to Information Security
2016
Finance: Cloud Computing, Cyber Security and Cyber Heist Finance: Cloud Computing, Cyber Security and Cyber Heist
2015
The Practical Guide To Mac Security The Practical Guide To Mac Security
2017