Logo

Passwords: Guised Indispensable's or Liabilities?

Large book cover: Passwords: Guised Indispensable's or Liabilities?

Passwords: Guised Indispensable's or Liabilities?
by


Number of pages: 168

Description:
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security; what are the myths and common mistakes that we all make when it comes to passwords. A look into another less thought of or even talked about dimension.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: IT Security CookbookIT Security Cookbook
by - Boran Consulting
This document defines a security policy, outlines structure of a security organization, presents current security mechanisms, and provides technical guidelines for operating systems, applications and networks used in client/server systems.
(16292 views)
Book cover: The Security Development LifecycleThe Security Development Lifecycle
by - Microsoft Press
This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs -- the Security Development Lifecycle (SDL). Security experts guide you through each stage of the SDL -- from design to testing and post-release.
(7223 views)
Book cover: Security Enhanced Applications for Information SystemsSecurity Enhanced Applications for Information Systems
by - InTech
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
(9802 views)
Book cover: The Protection of Information in Computer SystemsThe Protection of Information in Computer Systems
by - MIT
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures that are necessary to support information protection.
(10514 views)