Holiday book sale: Save up to 30% on print and eBooks. No promo code needed.
Save up to 30% on print and eBooks.
Selection, Protection, Authentication
1st Edition - December 11, 2005
Author: Mark Burnett
9 7 8 - 0 - 0 8 - 0 4 8 9 5 1 - 3
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand… Read more
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements. A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember.
* Examines the password problem from the perspective of the administrator trying to secure their network * Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot * Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords
Almost everyone using a computer for personal or business reasons must enter at least one password into their computer every time they log on. Every system administrator provides their users with some type of policy or guidelines for password creation and management. Every computer user or manager of users is a potential customer for this book.
1. How random is random? 2. Why they always want numbers in your password 3. Why you have to keep changing your password 4. Do the math, longer is stronger 5. 20 pointers for perfect passwords 6. Passing hashes 7. How crackers crack 8. You're never as tricky as you think 9. How to lose your password 10. Password safekeeping 11. Celebrate Password Day 12. What about secret questions? 13. Never, ever share your password 14. Never ever, except sometimes, reuse your password 15. What does your password say about you? 16. What do you say about your password? 17. The top 200 passwords 18. Who you are, what you have, and what you know.
No. of pages: 182
Published: December 11, 2005
eBook ISBN: 9780080489513
Affiliations and expertise
Independent researcher, consultant, and writer specializing in Windows security