skip to content
Perfect passwords : selection, protection, authentication Preview this item
ClosePreview this item
Checking...

Perfect passwords : selection, protection, authentication

Author: Mark Burnett; Dave Kleiman
Publisher: Rockland, Mass. : Syngress, 2006.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of  Read more...
Rating:

based on 1 rating(s) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Burnett, Mark.
Perfect passwords.
Rockland, Mass. : Syngress, 2006
(OCoLC)63802257
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Mark Burnett; Dave Kleiman
ISBN: 1423755006 9781423755005 9781597490412 1597490415 9780080489513 0080489516
OCLC Number: 64175109
Description: 1 online resource (xv, 181 pages) : illustrations
Contents: Passwords : the basics and beyond --
Meet your opponent --
Is random really random? --
Character diversity : beyond the alphabet --
Password length : making it count --
Time : the enemy of all secrets --
Living with passwords --
Ten password pointers : building strong passwords --
The 500 worst passwords of all time --
Another ten password pointers plus a bonus pointer --
The three rules for strong passwords --
Celebrate password day --
The three elements of authentication.
Responsibility: Mark Burnett ; Dave Kleiman, technical editor.

Abstract:

Teaches users how to select passwords that always meet complexity requirements. This book examines the password problem from the perspective of the administrator trying to secure their network.  Read more...

Reviews

Editorial reviews

Publisher Synopsis

"What is the key to coming up with a secure password? Length. Use 10 characters or more, says Mark Burnett, author of Perfect Passwords (Syngress, $26, amazon.com). "Best are passwords that consist Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

All user tags (3)

View most popular tags as: tag list | tag cloud

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/64175109> # Perfect passwords : selection, protection, authentication
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "64175109" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/793971370#Place/rockland_mass> ; # Rockland, Mass.
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://images.contentreserve.com/ImageType-100/1706-1/{DEF19A64-8683-4A5E-A720-14B709B28D28}Img100.jpg'" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/793971370#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:about <http://id.worldcat.org/fast/872785> ; # Computers--Access control--Passwords
    schema:about <http://experiment.worldcat.org/entity/work/data/793971370#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/793971370#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://id.loc.gov/authorities/subjects/sh85029555> ; # Computers--Access control--Passwords
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/85595344> ; # Dave Kleiman
    schema:creator <http://viaf.org/viaf/66199888> ; # Mark Burnett
    schema:datePublished "2006" ;
    schema:description "User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements. A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember. * Examines the password problem from the perspective of the administrator trying to secure their network * Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot * Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords."@en ;
    schema:description "Passwords : the basics and beyond -- Meet your opponent -- Is random really random? -- Character diversity : beyond the alphabet -- Password length : making it count -- Time : the enemy of all secrets -- Living with passwords -- Ten password pointers : building strong passwords -- The 500 worst passwords of all time -- Another ten password pointers plus a bonus pointer -- The three rules for strong passwords -- Celebrate password day -- The three elements of authentication."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/793971370> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/63802257> ;
    schema:name "Perfect passwords : selection, protection, authentication"@en ;
    schema:productID "64175109" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/64175109#PublicationEvent/rockland_mass_syngress_2006> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/793971370#Agent/syngress> ; # Syngress
    schema:url <http://proquest.tech.safaribooksonline.de/9781597490412> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149590> ;
    schema:url <http://www.SLQ.eblib.com.au/patron/FullRecord.aspx?p=254851> ;
    schema:url <http://er.llcc.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149590> ;
    schema:url <http://swbplus.bsz-bw.de/bsz396677479cov.htm> ;
    schema:url <http://dproxy.library.dc-uoit.ca/login?url=https://www.sciencedirect.com/science/book/9781597490412> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=11829> ;
    schema:url <http://www.myilibrary.com?id=103563> ;
    schema:url <http://www.sciencedirect.com/science/book/9781597490412> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149590> ;
    schema:url <http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597490412> ;
    schema:url <https://www.overdrive.com/search?q=DEF19A64-8683-4A5E-A720-14B709B28D28> ;
    schema:url <http://www.myilibrary.com?id=103563&ref=toc> ;
    schema:url <http://site.ebrary.com/id/10110287> ;
    schema:url <https://ezproxy.aub.edu.lb/login?url=http://www.sciencedirect.com/science/book/9781597490412> ;
    schema:url <http://proquest.safaribooksonline.com/9781597490412> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=254851> ;
    schema:url <https://cornell-library.skillport.com/skillportfe/main.action?assetid=11829> ;
    schema:url "http://images.contentreserve.com/ImageType-100/1706-1/{DEF19A64-8683-4A5E-A720-14B709B28D28}Img100.jpg" ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=254851> ;
    schema:workExample <http://worldcat.org/isbn/9780080489513> ;
    schema:workExample <http://worldcat.org/isbn/9781597490412> ;
    schema:workExample <http://worldcat.org/isbn/9781423755005> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/64175109> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/793971370#Place/rockland_mass> # Rockland, Mass.
    a schema:Place ;
    schema:name "Rockland, Mass." ;
    .

<http://experiment.worldcat.org/entity/work/data/793971370#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/793971370#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/793971370#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85029555> # Computers--Access control--Passwords
    a schema:Intangible ;
    schema:name "Computers--Access control--Passwords"@en ;
    .

<http://id.worldcat.org/fast/872785> # Computers--Access control--Passwords
    a schema:Intangible ;
    schema:name "Computers--Access control--Passwords"@en ;
    .

<http://viaf.org/viaf/66199888> # Mark Burnett
    a schema:Person ;
    schema:familyName "Burnett" ;
    schema:givenName "Mark" ;
    schema:name "Mark Burnett" ;
    .

<http://viaf.org/viaf/85595344> # Dave Kleiman
    a schema:Person ;
    schema:familyName "Kleiman" ;
    schema:givenName "Dave" ;
    schema:name "Dave Kleiman" ;
    .

<http://worldcat.org/isbn/9780080489513>
    a schema:ProductModel ;
    schema:isbn "0080489516" ;
    schema:isbn "9780080489513" ;
    .

<http://worldcat.org/isbn/9781423755005>
    a schema:ProductModel ;
    schema:isbn "1423755006" ;
    schema:isbn "9781423755005" ;
    .

<http://worldcat.org/isbn/9781597490412>
    a schema:ProductModel ;
    schema:isbn "1597490415" ;
    schema:isbn "9781597490412" ;
    .

<http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597490412>
    rdfs:comment "An electronic book accessible through the World Wide Web; click for information" ;
    .

<http://www.worldcat.org/oclc/63802257>
    a schema:CreativeWork ;
    rdfs:label "Perfect passwords." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/64175109> ; # Perfect passwords : selection, protection, authentication
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.