01016nkm2-2200313---450-99000999760040332120150917133739.0000999760FED01000999760(Aleph)000999760FED0100099976020150917f19601970km-y0itay50------bagerengDEhe-c--------------<<Der >>VulkanoRisorsa grafica= <<The >>Isle of VulcanoRomaDia filmHeidelbergGeorg Westermann Verlag[196.]1 diapositivacol.36 x 24 mm su supporto di cartone 50 x 50 mmTit. aggiunto in ital. rilevato dagli archivi dell'ex Ist. di Geografia001000999286<<L'>>isola di VulcanoSiciliaIsola di VulcanoImmaginiGeorg Westermann VerlagITUNINARICAUNIMARCGR990009997600403321Scat. West. S-01(012)Ist. s.i.ILFGEILFGEUNINA03105nam 2200625Ia 450 991078375370332120200520144314.01-281-03563-797866110356310-08-048951-61-59749-095-4(CKB)1000000000246658(EBL)254851(OCoLC)475969605(SSID)ssj0000219692(PQKBManifestationID)11186932(PQKBTitleCode)TC0000219692(PQKBWorkID)10249754(PQKB)10760513(Au-PeEL)EBL254851(CaPaEBR)ebr10110287(CaONFJC)MIL103563(OCoLC)935230518(CaSebORM)9781597490412(MiAaPQ)EBC254851(EXLCZ)99100000000024665820060215d2006 uy 0engur|n|---|||||txtccrPerfect passwords[electronic resource] selection, protection, authentication /Mark Burnett ; Dave Kleiman, technical editor1st editionRockland, Mass. Syngress20061 online resource (200 p.)Description based upon print version of record.1-59749-041-5 Cover; Front Matter; Contents; Chapter 1: Passwords: The Basics and Beyond; Chapter 2: Meet Your Opponent; Chapter 3: Is Random Really Random?; Chapter 4: Character Diversity: Beyond the Alphabet; Chapter 5: Password Length: Making It Count; Chapter 6: Time: The Enemy of All Secrets; Chapter 7: Living with Passwords; Chapter 8: Ten Password Pointers: Building Strong Passwords; Chapter 9: The 500 Worst Passwords of All Time; Chapter 10: Another Ten Password Pointers Plus a Bonus Pointer; Chapter 11: The Three Rules for Strong Passwords; Chapter 12: Celebrate Password DayChapter 13: The Three Elements of AuthenticationAppendix A: Test Your Password; Appendix B: Random Seed Words; Appendix C: Complete Randomness; IndexUser passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate seComputer securityComputersAccess controlPasswordsComputer security.ComputersAccess controlPasswords.005.8Burnett Mark739089Kleiman Dave627560MiAaPQMiAaPQMiAaPQBOOK9910783753703321Perfect passwords3736605UNINA