Logo

Passwords: Guised Indispensable's or Liabilities?

Large book cover: Passwords: Guised Indispensable's or Liabilities?

Passwords: Guised Indispensable's or Liabilities?
by


Number of pages: 168

Description:
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security; what are the myths and common mistakes that we all make when it comes to passwords. A look into another less thought of or even talked about dimension.

Home page url

Download or read it online for free here:
Download link
(16MB, PDF)

Similar books

Book cover: Provable Security of NetworksProvable Security of Networks
by - arXiv
We propose a definition of security and a definition of robustness of networks against the cascading failure models of deliberate attacks and random errors respectively, and investigate the principles of the security and robustness of networks.
(5346 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(15075 views)
Book cover: Security and Privacy for Microsoft Office 2010 UsersSecurity and Privacy for Microsoft Office 2010 Users
by - Microsoft Press
This book is intended as a guide to how to use the powerful security and privacy features of Office 2010 platform effectively. Workers in organizations of all sizes, from small businesses to large enterprises, will benefit from this book.
(5013 views)
Book cover: Security Enhanced Applications for Information SystemsSecurity Enhanced Applications for Information Systems
by - InTech
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
(5693 views)