Logo

Passwords: Guised Indispensable's or Liabilities?

Large book cover: Passwords: Guised Indispensable's or Liabilities?

Passwords: Guised Indispensable's or Liabilities?
by


Number of pages: 168

Description:
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security; what are the myths and common mistakes that we all make when it comes to passwords. A look into another less thought of or even talked about dimension.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: A Guide to Claims-Based Identity and Access ControlA Guide to Claims-Based Identity and Access Control
by - Microsoft Press
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
(12811 views)
Book cover: IT Security CookbookIT Security Cookbook
by - Boran Consulting
This document defines a security policy, outlines structure of a security organization, presents current security mechanisms, and provides technical guidelines for operating systems, applications and networks used in client/server systems.
(16288 views)
Book cover: An Introduction to Computer Security: The NIST HandbookAn Introduction to Computer Security: The NIST Handbook
by
The book provides info on securing hardware and software resources of sensitive systems, explains important concepts and interrelationships of security controls. It illustrates the major techniques for each control, and related considerations.
(19300 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(21307 views)