Covers different authentication approaches and their advantages and disadvantages
Provides best practices for secure online access of information resources
Includes a special chapter on an innovative approach called Negative Authentication (a game-changer)
Gives details of recent trends in continuous active authentication techniques as next generation identity ecosystem and industry adoption such systems