The Essential Guide to Understanding Password-Based Authentication

Even veteran IT pros don’t fully understand the authentication technologies used by Windows and other operating systems. With their deep knowledge of authentication protocols such as NTLM and Kerberos, hackers can steal your users' credentials and then secretly take your most valuable data. In this guide, you’ll learn the techniques hackers use to subvert authentication controls. More
Download: epub
About Andy Green

Andy blogs about data privacy and security regulations for Varonis Systems. He also closely follows new malware threats and what it means for IT security. You can follow him at @agreenjay.

Readers of This Book Also Read

Reviews

This book has not yet been reviewed.
Report this book