Search Books
How to Cheat at Managing Wi… Google Talking

Perfect Passwords: Selection, Protection, Authentication

Author Mark Burnett
Publisher Syngress
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
26.51 27.95 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $4.29

✓ Usually ships in 24 hours

Share:
Book Details
Author(s)Mark Burnett
PublisherSyngress
ISBN / ASIN1597490415
ISBN-139781597490412
AvailabilityUsually ships in 24 hours
Sales Rank1,572,605
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements.

A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember.

* Examines the password problem from the perspective of the administrator trying to secure their network
* Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot
* Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords
The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View