The Essential Guide to Understanding Password-Based Authentication

Even veteran IT pros don’t fully understand the authentication technologies used by Windows and other operating systems. With their deep knowledge of authentication protocols such as NTLM and Kerberos, hackers can steal your users' credentials and then secretly take your most valuable data. In this guide, you’ll learn the techniques hackers use to subvert authentication controls. More
Download: epub
About Andy Green

Andy blogs about data privacy and security regulations for Varonis Systems. He also closely follows new malware threats and what it means for IT security. You can follow him at @agreenjay.

Learn more about Andy Green


This book has not yet been reviewed.
Report this book