Logo

Passwords: Guised Indispensable's or Liabilities?

Large book cover: Passwords: Guised Indispensable's or Liabilities?

Passwords: Guised Indispensable's or Liabilities?
by


Number of pages: 168

Description:
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security; what are the myths and common mistakes that we all make when it comes to passwords. A look into another less thought of or even talked about dimension.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Markets for Cybercrime Tools and Stolen Data: Hackers' BazaarMarkets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
by - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(8444 views)
Book cover: Cryptography and Security in ComputingCryptography and Security in Computing
by - InTech
The purpose of this book is to present some of the security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defense mechanisms.
(21144 views)
Book cover: Safeguarding Your TechnologySafeguarding Your Technology
by - NCES
This guide has been developed for educational administrators at the building, campus, district, system, and state levels. It will help them better understand how to effectively secure their information, software, computer and networking equipment.
(11121 views)
Book cover: The Developer Highway CodeThe Developer Highway Code
by - Microsoft Press
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
(20064 views)