03653nam a2200385Ii 4500991003250579707536m d cr cn|||||||||070806s2006 maua s 001 0 eng d97815974904121597490415b13655541-39ule_inst116424:116522Elsevier Science & Technologyhttp://www.sciencedirect.comOPELSOPELSTEFA005.8222Burnett, Mark(Mark M.)627556Perfect passwords[electronic resource] :selection, protection, authentication /Mark Burnett ; Dave Kleiman, technical editor.Rockland, MA :Syngress,c2006.xv, 181 p. :ill. ;23 cm.Includes index.How random is random?; Why they always want numbers in your password; Why you have to keep changing your password; 20 pointers for perfect passwords; How crackers crack; You're never as tricky as you think; Password safekeeping; Celebrate Password Day; What about secret questions? Never ever, except sometimes, reuse your password; What does your password say about you?; The top 200 passwords.User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements. A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember. * Examines the password problem from the perspective of the administrator trying to secure their network * Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot * Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords.Electronic reproduction.Amsterdam :Elsevier Science & Technology,2007.Mode of access: World Wide Web.System requirements: Web browser.Title from title screen (viewed on Aug. 2, 2007).Access may be restricted to users at subscribing institutions.ComputersAccess controlPasswords.Electronic books.localKleiman, Dave.Original15974904159781597490412(OCoLC)63802257Referexhttp://www.sciencedirect.com/science/book/9781597490412An electronic book accessible through the World Wide Web; click for information.b1365554124-02-2224-01-08991003250579707536C0TEFPerfect passwords1213090UNISALENTOle02924-01-08mm -engmau0001064nam0-2200313 --450 991100649570332120250613122911.09780521895798VOL. 120250613d2024----kmuy0itay5050 baengGB 001yy<<A >>Commentary on Ovid's Metamorphose[general editor] Alessandro BarchiesiCambridgeCambridge University Press2024 -v.24 cm1.: XXVI, 758 p.1.: General Introduction and Books 1-6Alessandro Barchiesi, Gianpiero RosatiBooks 1-3 translated by Erin Brady, Books 4-6 translated by Theresa Davis. - 2024871.01Barchiesi,Alessandro158532Rosati,Gianpiero259451Davis,TheresaBrady,ErinITUNINAREICATUNIMARCBK9911006495703321P2B 650 OV/S 12 (1)2025/2324FLFBCFLFBCCommentary on Ovid's Metamorphose4395188UNINA