Cargando…

Perfect passwords : selection, protection, authentication /

User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the p...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Burnett, Mark
Otros Autores: Kleiman, Dave
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Syngress, 2006.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocm64175109
003 OCoLC
005 20231117015030.0
006 m o d
007 cr cnu---unuuu
008 060221s2006 maua o 000 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d YDXCP  |d OCLCQ  |d TUU  |d OCLCQ  |d B24X7  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OPELS  |d OKU  |d FVL  |d UMI  |d DEBSZ  |d NLGGC  |d OCLCQ  |d MERUC  |d CCO  |d E7B  |d IDEBK  |d NTG  |d WPG  |d COCUF  |d CPC  |d DKDLA  |d TEFOD  |d OCLCF  |d EBLCP  |d AU@  |d TEFOD  |d OCLCQ  |d OCL  |d COO  |d OCLCQ  |d REB  |d AZK  |d OCLCQ  |d LOA  |d JBG  |d AGLDB  |d CNNOR  |d MOR  |d PIFBR  |d LIV  |d OCLCQ  |d WY@  |d U3W  |d LUE  |d STF  |d BRL  |d WRM  |d D6H  |d MNI  |d OCLCQ  |d VTS  |d CEF  |d OCLCQ  |d INT  |d NRAMU  |d MOQ  |d VT2  |d OCLCQ  |d A6Q  |d OCLCQ  |d LEAUB  |d OCLCQ  |d BRF  |d VLY  |d UKCRE  |d INARC  |d OCLCO  |d OCLCQ  |d IOY  |d OCLCQ 
019 |a 64668383  |a 133167429  |a 162597438  |a 171565986  |a 437163454  |a 473723609  |a 475327203  |a 475969605  |a 507428581  |a 560015377  |a 606030556  |a 647464711  |a 722429578  |a 728034151  |a 742284866  |a 780972108  |a 824491111  |a 856956876  |a 888767895  |a 935393903  |a 961586338  |a 962649504  |a 966210706  |a 988464465  |a 991958504  |a 992109118  |a 1035683215  |a 1037447286  |a 1038693174  |a 1045521213  |a 1058026027  |a 1076309258  |a 1081234730  |a 1153032021  |a 1162260984  |a 1192334755  |a 1228608612  |a 1240509073 
020 |a 1423755006  |q (electronic bk.) 
020 |a 9781423755005  |q (electronic bk.) 
020 |a 9781597490412 
020 |a 1597490415 
020 |a 9780080489513 
020 |a 0080489516 
020 |a 1281035637 
020 |a 9781281035639 
020 |a 9786611035631 
020 |a 661103563X 
020 |z 1597490954 
020 |z 9781597490955 
024 1 |a 792502904152 
024 3 |a 9781597490412 
035 |a (OCoLC)64175109  |z (OCoLC)64668383  |z (OCoLC)133167429  |z (OCoLC)162597438  |z (OCoLC)171565986  |z (OCoLC)437163454  |z (OCoLC)473723609  |z (OCoLC)475327203  |z (OCoLC)475969605  |z (OCoLC)507428581  |z (OCoLC)560015377  |z (OCoLC)606030556  |z (OCoLC)647464711  |z (OCoLC)722429578  |z (OCoLC)728034151  |z (OCoLC)742284866  |z (OCoLC)780972108  |z (OCoLC)824491111  |z (OCoLC)856956876  |z (OCoLC)888767895  |z (OCoLC)935393903  |z (OCoLC)961586338  |z (OCoLC)962649504  |z (OCoLC)966210706  |z (OCoLC)988464465  |z (OCoLC)991958504  |z (OCoLC)992109118  |z (OCoLC)1035683215  |z (OCoLC)1037447286  |z (OCoLC)1038693174  |z (OCoLC)1045521213  |z (OCoLC)1058026027  |z (OCoLC)1076309258  |z (OCoLC)1081234730  |z (OCoLC)1153032021  |z (OCoLC)1162260984  |z (OCoLC)1192334755  |z (OCoLC)1228608612  |z (OCoLC)1240509073 
050 4 |a QA76.9.A25  |b B875 2006eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a UACD  |2 bicssc 
082 0 4 |a 005.8  |2 22 
100 1 |a Burnett, Mark. 
245 1 0 |a Perfect passwords :  |b selection, protection, authentication /  |c Mark Burnett ; Dave Kleiman, technical editor. 
260 |a Rockland, Mass. :  |b Syngress,  |c 2006. 
300 |a 1 online resource (xv, 181 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
588 0 |a Print version record. 
505 0 |a Passwords : the basics and beyond -- Meet your opponent -- Is random really random? -- Character diversity : beyond the alphabet -- Password length : making it count -- Time : the enemy of all secrets -- Living with passwords -- Ten password pointers : building strong passwords -- The 500 worst passwords of all time -- Another ten password pointers plus a bonus pointer -- The three rules for strong passwords -- Celebrate password day -- The three elements of authentication. 
520 |a User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements. A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember. * Examines the password problem from the perspective of the administrator trying to secure their network * Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot * Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords. 
546 |a English. 
650 0 |a Computers  |x Access control  |x Passwords. 
650 6 |a Ordinateurs  |x Acc�es  |x Contr�ole  |x Mots de passe.  |0 (CaQQLa)201-0037038 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computers  |x Access control  |x Passwords.  |2 fast  |0 (OCoLC)fst00872785 
700 1 |a Kleiman, Dave. 
776 0 8 |i Print version:  |a Burnett, Mark.  |t Perfect passwords.  |d Rockland, Mass. : Syngress, 2006  |z 1597490415  |w (OCoLC)63802257 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597490412  |z Texto completo