Perfect passwords selection, protection, authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every computer user must face the pr...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Rockland, Mass. :
Syngress
2006.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009626928706719 |
Tabla de Contenidos:
- Cover; Front Matter; Contents; Chapter 1: Passwords: The Basics and Beyond; Chapter 2: Meet Your Opponent; Chapter 3: Is Random Really Random?; Chapter 4: Character Diversity: Beyond the Alphabet; Chapter 5: Password Length: Making It Count; Chapter 6: Time: The Enemy of All Secrets; Chapter 7: Living with Passwords; Chapter 8: Ten Password Pointers: Building Strong Passwords; Chapter 9: The 500 Worst Passwords of All Time; Chapter 10: Another Ten Password Pointers Plus a Bonus Pointer; Chapter 11: The Three Rules for Strong Passwords; Chapter 12: Celebrate Password Day
- Chapter 13: The Three Elements of AuthenticationAppendix A: Test Your Password; Appendix B: Random Seed Words; Appendix C: Complete Randomness; Index