Perfect passwords : selection, protection, authentication
(eBook)

Book Cover
Average Rating
Contributors
Published
Rockland, Mass. : Syngress, 2006.
Format
eBook
ISBN
0080489516, 1281035637, 1423755006, 1597490415, 661103563X, 9780080489513, 9781281035639, 9781423755005, 9781597490412, 9786611035631
Physical Desc
1 online resource (xv, 181 pages) : illustrations
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

Syndetics Unbound

More Details

Language
English
UPC
792502904152, 9781597490412

Notes

Description
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements. A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember. * Examines the password problem from the perspective of the administrator trying to secure their network * Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot * Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords.
Language
English.

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Burnett, M., & Kleiman, D. (2006). Perfect passwords: selection, protection, authentication . Syngress.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Burnett, Mark and Dave. Kleiman. 2006. Perfect Passwords: Selection, Protection, Authentication. Syngress.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Burnett, Mark and Dave. Kleiman. Perfect Passwords: Selection, Protection, Authentication Syngress, 2006.

MLA Citation, 9th Edition (style guide)

Burnett, Mark., and Dave Kleiman. Perfect Passwords: Selection, Protection, Authentication Syngress, 2006.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
c3f1d842-cbed-3263-fb00-6315e1515395-eng
Go To Grouped Work

Grouping Information

Grouped Work IDc3f1d842-cbed-3263-fb00-6315e1515395-eng
Full titleperfect passwords selection protection authentication
Authorburnett mark
Grouping Categorybook
Last Update2024-09-06 16:31:08PM
Last Indexed2024-09-20 03:57:51AM

Book Cover Information

Image Sourcesyndetics
First LoadedSep 12, 2024
Last UsedSep 12, 2024

Marc Record

First DetectedJul 29, 2024 03:56:15 PM
Last File Modification TimeSep 06, 2024 04:31:33 PM

MARC Record

LEADER05796cam a2200565 a 4500
001ocm64175109 
003OCoLC
00520240830103855.0
006m     o  d        
007cr cnu---unuuu
008060221s2006    maua    o     000 0 eng d
019 |a 64668383|a 133167429|a 162597438|a 171565986|a 437163454|a 473723609|a 475327203|a 475969605|a 507428581|a 560015377|a 606030556|a 647464711|a 722429578|a 728034151|a 742284866|a 780972108|a 824491111|a 856956876|a 888767895|a 935393903|a 961586338|a 962649504|a 966210706|a 988464465|a 991958504|a 992109118|a 1035683215|a 1037447286|a 1038693174|a 1045521213|a 1058026027|a 1076309258|a 1081234730|a 1153032021|a 1162260984|a 1192334755|a 1228608612|a 1240509073
020 |a 0080489516
020 |a 1281035637
020 |a 1423755006|q (electronic bk.)
020 |a 1597490415
020 |a 661103563X
020 |a 9780080489513
020 |a 9781281035639
020 |a 9781423755005|q (electronic bk.)
020 |a 9781597490412
020 |a 9786611035631
020 |z 1597490954
020 |z 9781597490955
0241 |a 792502904152
0243 |a 9781597490412
035 |a (OCoLC)64175109|z (OCoLC)64668383|z (OCoLC)133167429|z (OCoLC)162597438|z (OCoLC)171565986|z (OCoLC)437163454|z (OCoLC)473723609|z (OCoLC)475327203|z (OCoLC)475969605|z (OCoLC)507428581|z (OCoLC)560015377|z (OCoLC)606030556|z (OCoLC)647464711|z (OCoLC)722429578|z (OCoLC)728034151|z (OCoLC)742284866|z (OCoLC)780972108|z (OCoLC)824491111|z (OCoLC)856956876|z (OCoLC)888767895|z (OCoLC)935393903|z (OCoLC)961586338|z (OCoLC)962649504|z (OCoLC)966210706|z (OCoLC)988464465|z (OCoLC)991958504|z (OCoLC)992109118|z (OCoLC)1035683215|z (OCoLC)1037447286|z (OCoLC)1038693174|z (OCoLC)1045521213|z (OCoLC)1058026027|z (OCoLC)1076309258|z (OCoLC)1081234730|z (OCoLC)1153032021|z (OCoLC)1162260984|z (OCoLC)1192334755|z (OCoLC)1228608612|z (OCoLC)1240509073
037 |a 116424:116522|b Elsevier Science & Technology|n http://www.sciencedirect.com
037 |a DEF19A64-8683-4A5E-A720-14B709B28D28|b OverDrive, Inc.|n http://www.overdrive.com
040 |a N$T|b eng|e pn|c N$T|d OCLCQ|d YDXCP|d OCLCQ|d TUU|d OCLCQ|d B24X7|d OCLCQ|d OCLCO|d OCLCQ|d OPELS|d OKU|d FVL|d UMI|d DEBSZ|d NLGGC|d OCLCQ|d MERUC|d CCO|d E7B|d IDEBK|d NTG|d WPG|d COCUF|d CPC|d DKDLA|d TEFOD|d OCLCF|d EBLCP|d AU@|d TEFOD|d OCLCQ|d OCL|d COO|d OCLCQ|d REB|d AZK|d OCLCQ|d LOA|d JBG|d AGLDB|d CNNOR|d MOR|d PIFBR|d LIV|d OCLCQ|d WY@|d U3W|d LUE|d STF|d BRL|d WRM|d D6H|d MNI|d OCLCQ|d VTS|d CEF|d OCLCQ|d INT|d NRAMU|d MOQ|d VT2|d OCLCQ|d A6Q|d OCLCQ|d LEAUB|d OCLCQ|d BRF|d VLY|d UKCRE|d INARC|d OCLCO|d OCLCQ|d IOY|d OCLCQ|d OCLCO|d OCLCL|d SXB|d OCLCQ|d OCLCO
049 |a FMGA
050 4|a QA76.9.A25|b B875 2006eb
08204|a 005.8|2 22
1001 |a Burnett, Mark.
24510|a Perfect passwords :|b selection, protection, authentication /|c Mark Burnett ; Dave Kleiman, technical editor.
260 |a Rockland, Mass. :|b Syngress,|c 2006.
300 |a 1 online resource (xv, 181 pages) :|b illustrations
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
347 |a data file
5050 |a Passwords : the basics and beyond -- Meet your opponent -- Is random really random? -- Character diversity : beyond the alphabet -- Password length : making it count -- Time : the enemy of all secrets -- Living with passwords -- Ten password pointers : building strong passwords -- The 500 worst passwords of all time -- Another ten password pointers plus a bonus pointer -- The three rules for strong passwords -- Celebrate password day -- The three elements of authentication.
520 |a User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements. A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember. * Examines the password problem from the perspective of the administrator trying to secure their network * Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot * Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords.
546 |a English.
5880 |a Print version record.
650 0|a Computers|x Access control|x Passwords.|0 http://id.loc.gov/authorities/subjects/sh85029555
7001 |a Kleiman, Dave.|1 https://id.oclc.org/worldcat/entity/E39PBJyGYb73VHDHky8t4pM3wC|0 http://id.loc.gov/authorities/names/no2006050002
758 |i has work:|a Perfect passwords (Text)|1 https://id.oclc.org/worldcat/entity/E39PCGrqWJxM3wGGtrj9BykWCP|4 https://id.oclc.org/worldcat/ontology/hasWork
77608|i Print version:|a Burnett, Mark.|t Perfect passwords.|d Rockland, Mass. : Syngress, 2006|z 1597490415|w (OCoLC)63802257
85640|u https://www.aclib.us/OReilly