About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 29. Chapters: Activated Content, Atomic authorization, Authentication protocol, Billion laughs, Black Hat Briefings, Blended threat, CDP Spoofing, Certified Computer Examiner, Code audit, Computer Security Institute, Conference on Email and Anti-Spam, Contact scraping, Cracktivism, Cryptographic log on, Cyber Security Task Force, Daniel B. Cid, Data Security Council of India, Digipass, Distributed Access Control System, DOD Information Assurance Certification and Accreditation Program, Draw a Secret, DREAD: Risk assessment model, Dynablock, EAuthentication, Ekoparty, Extensible Threat Management (XTM), Firewalk (computing), Flaw hypothesis methodology, Forward anonymity, Full disclosure (mailing list), Global Trust Council, Hack.lu, Hacker Halted, Heap feng shui, Hi-Tech Crime Enquiry Cell, High-water mark (computer security), Information Card Foundation, Initiative For Open Authentication, JIT spraying, Keystore, Kippo, Light-Weight Identity, Location-based authentication, Logical access control, Mutual authentication, NemID, Network intrusion detection system, Nguyen Quang Huy, One-time authorization code, OneLogin, OpenAM, OpenDJ, OpenIDM, OpenSSO, PassWindow, Penny Black (research project), Pete Finnigan, Point of Access for Providers of Information, Pubcookie, Salute picture, Secure Trusted Operating System Consortium, Security store, Security Token Service, SPNEGO, Spring Security, System Reconfiguration Attacks, Transaction authentication, Transaction verification, Trust boundary, TUPAS, U-Prove, Vulnerability database, Wargame (hacking), Wilmagate. Excerpt: PassWindow is a technique of producing one-time passwords and facilitating transaction verification that is used as an online second-factor authentication method. The system works by encoding digits into a segment matrix similar to the seven-segment matrices used in...