Adam Marsh

9%
Flag icon
When attempting to authenticate a user, sites or applications look for at least two of three things. Typically these are something you have, something you know, and something you are.
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Rate this book
Clear rating
Open Preview