CONTENTS
You’ve been using two-factor for years
Authentication security’s naming problem
Looking down a road to greater adoption
Chapter 2: Risks to One-Factor Authentication
Our solutions are also our problems
Attacking password-only security
The ‘fix’ isn’t just better passwords
Chapter 3: Understanding the Basics
In-band and out-of-band authentication
Chapter 4: Second-Factor Technologies
Geolocation-aware authentication
Push-notification-based authentication
Get Two-Factor Authentication now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.