• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to secondary navigation
  • Skip to primary sidebar

OnlineProgrammingBooks.com

Legally Free Computer Books

  • All Categories
  • All Books
  • All Categories
  • All Books
  • About Us
  • Privacy policy
  • Disclaimer
  • Subscribe
  • Contact
You are here: Home ▶ Information Technology (IT) ▶ Who Goes There?: Authentication Through the Lens of Privacy

Who Goes There?: Authentication Through the Lens of Privacy

March 24, 2006

Who Goes There?: Authentication Through the Lens of Privacy

Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. The book explains how privacy is affected by system design decisions.

Book Description

It also describes government s unique role in authentication and what this means for how government can use authentication with minimal invasions of privacy.The book explains how privacy is affected by system design decisions. It also describes government s unique role in authentication and what this means for how government can use authentication with minimal invasions of privacy. In addition, Who Goes There? outlines usability and security considerations and provides a primer on privacy law and policy.

Table of Contents

  • Introduction and Overview
  • Authentication in the Abstract
  • Privacy Challenges in Authentication Systems
  • Security and Usability
  • Authentication Technologies
  • Authentication, Privacy, and the Roles of Government
  • A Toolkit for Privacy in the Context of Authentication

Download Free PDF / Read Online

Author(s): Stephen T. Kent and Lynette I. Millett.
Publisher: National Academies Press
Format(s): PDF, HTML
File size: 3.94 MB
Number of pages: 233
Link: Download.

Similar Books:

  1. Linux Administrator’s Security Guide
  2. More Servlets and JavaServer Pages
  3. Building Secure ASP.NET Applications
  4. OWASP Guide to Building Secure Web Applications and Web Services
  5. Security+ Essentials
Previous Post: « JavaScript 1.1 Language Specification
Next Post: The Zope Book »

Primary Sidebar

Get Latest Updates

  • Facebook
  • Pinterest
  • RSS
  • Twitter
  • YouTube
  • About Us
  • Privacy policy
  • Disclaimer
  • Subscribe
  • Contact

Copyright © 2006–2025 OnlineProgrammingBooks.com