Perfect Password
Selection, Protection, Authentication
Seiten
2006
Syngress Media,U.S. (Verlag)
978-1-59749-041-2 (ISBN)
Syngress Media,U.S. (Verlag)
978-1-59749-041-2 (ISBN)
- Keine Verlagsinformationen verfügbar
- Artikel merken
Teaches users how to select passwords that always meet complexity requirements. This book examines the password problem from the perspective of the administrator trying to secure their network.
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.
Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements.
A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember.
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.
Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements.
A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember.
How random is random?; Why they always want numbers in your password; Why you have to keep changing your password; 20 pointers for perfect passwords; How crackers crack; You're never as tricky as you think; Password safekeeping; Celebrate Password Day; What about secret questions? Never ever, except sometimes, reuse your password; What does your password say about you?; The top 200 passwords
Erscheint lt. Verlag | 9.1.2006 |
---|---|
Verlagsort | Rockland, MA |
Sprache | englisch |
Maße | 152 x 229 mm |
Gewicht | 260 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 1-59749-041-5 / 1597490415 |
ISBN-13 | 978-1-59749-041-2 / 9781597490412 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Buch | Hardcover (2012)
Westermann Schulbuchverlag
34,95 €
Schulbuch Klassen 7/8 (G9)
Buch | Hardcover (2015)
Klett (Verlag)
30,50 €
Buch | Softcover (2004)
Cornelsen Verlag
25,25 €