Most administrators and users who select or use MFA have been told that MFA is far less hackable, or even unhackable, and are shocked to learn how easy all MFA solutions are to hack.
There is no safe MFA solution. Most can be hacked at least 5 different ways. Hacking MFA will discuss how MFA works behind the scenes, and how those multi-step, poorly-linked, authentication steps allow all MFA solutions to be hacked and compromised. The book will cover at least 18 ways various MFA solutions can be hacked, including the methods (and defenses) which are common to all MFA solutions. It will cover the various types of MFA solutions, their strengthens and weaknesses, and help reader to pick (or develop) the best, most defensible MFA solution for their environment (or potential customers).
The book will end with a simple method which will allow any reader to quickly evaluate their own solutions.
This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.
Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.
Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:
ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days
Share This Book: