About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 93. Chapters: Access control list, Authentication, Authorization, HTTP cookie, Rootkit, Copy protection, Two-factor authentication, Security token, Subscriber Identity Module, Mandatory access control, Security Assertion Markup Language, Comparison of privilege authorization features, One-time password, Computational trust, Digital identity, Directory service, Object-capability model, Bell-LaPadula model, Database audit, Vidoop, Single sign-on, OAuth, Federated identity, MicroID, Richacls, Tripcode, Transaction authentication number, Spring Security, Distributed Access Control System, Integrated Windows Authentication, Login, Universal controls, Internet Authentication Service, PassWindow, Identity driven networking, Discretionary access control, HERAS-AF, Restricting Access to Databases, Security question, HTTP+HTML form-based authentication, Multi-factor authentication, Access Control Matrix, Software token, Wilmagate, Closed-loop authentication, Registered user, IBM Tivoli Access Manager, Mobilegov, Java Authentication and Authorization Service, Risk-based authentication, Pre-boot authentication, Location-based authentication, SiteKey, Global Trust Council, Delegated administration, Atomic authorization, Mutual authentication, Organisation-based access control, DataLock Technology, Time-based One-time Password Algorithm, Strong authentication, Microsoft Fingerprint Reader, NIST RBAC model, Voms, IBM Lightweight Third-Party Authentication, Digipass, Logical access control, Role hierarchy, Delegation of Control, LOMAC, One-time authorization code, NemID, Secure attention key, EAuthentication, Cryptographic log on, Initiative For Open Authentication, Salute picture, Draw a Secret, Identity Assertion Provider, TUPAS, Security store, Windows credentials. Excerpt: A cookie, also known as an HTTP cookie, web cookie, or browser cookie...