
At a Glance
182 Pages
22.23 x 14.61 x 1.27
Paperback
$78.75
or 4 interest-free payments of $19.69 with
orShips in 15 to 25 business days
Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements.
A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember.
* Examines the password problem from the perspective of the administrator trying to secure their network
* Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot
* Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords
Industry Reviews
| Passwords: The Basics and Beyond | p. 1 |
| The Beginning | p. 2 |
| Our Passwords | p. 3 |
| Silly Human Behavior | p. 5 |
| You're Not That Clever | p. 7 |
| Weak Wordlist Words | p. 7 |
| Weak Wordlist Words with Numbers | p. 8 |
| Weak Wordlist Words with Simple Obfuscation | p. 8 |
| License Plate Passwords | p. 8 |
| Weak Wordlist Words Doubled | p. 9 |
| Garbled Randomness | p. 9 |
| Patterns or Sequences | p. 9 |
| Summary | p. 10 |
| Meet Your Opponent | p. 11 |
| The Cracker | p. 12 |
| Why My Password? | p. 12 |
| Password Cracking | p. 13 |
| Plaintext, Encryption, and Hashes | p. 13 |
| How Your Password Falls | p. 15 |
| Smart Guesses | p. 17 |
| Dictionary Attacks | p. 17 |
| Brute-Force Attacks | p. 18 |
| Rainbow Tables | p. 18 |
| Social Engineering | p. 18 |
| Other Techniques | p. 19 |
| Winning the Numbers Game | p. 19 |
| Summary | p. 21 |
| Is Random Really Random? | p. 23 |
| Randomness | p. 24 |
| What Is Randomness? | p. 25 |
| Even Distribution | p. 26 |
| Unpredictability | p. 29 |
| Uniqueness | p. 30 |
| Human Randomness | p. 31 |
| Machine Randomness | p. 32 |
| Compensating for Lack of Randomness | p. 33 |
| Less Predictable | p. 35 |
| More Unique | p. 36 |
| Character Diversity: Beyond the Alphabet | p. 39 |
| Understanding Character Space | p. 40 |
| Password Permutations | p. 43 |
| Character Sets | p. 45 |
| Lowercase Letters | p. 47 |
| Uppercase Letters | p. 47 |
| Numbers | p. 48 |
| Symbols | p. 49 |
| Summary | p. 52 |
| Password Length: Making It Count | p. 53 |
| Introduction | p. 54 |
| The Benefits of Long Passwords | p. 54 |
| Easy to Memorize | p. 54 |
| Easy to Type | p. 57 |
| Harder to Crack | p. 58 |
| Other Security Benefits | p. 61 |
| Building Longer Passwords | p. 63 |
| Adding Another Word | p. 63 |
| Bracketing | p. 63 |
| Number Patterns | p. 64 |
| Fun Words | p. 64 |
| Repetition | p. 65 |
| Prefixes and Suffixes | p. 66 |
| Colorizing | p. 66 |
| Sentences | p. 66 |
| Summary | p. 67 |
| Time: The Enemy of All Secrets | p. 69 |
| Aging Passwords | p. 70 |
| It's About Time | p. 70 |
| Overbearing Policies | p. 70 |
| Password Expiration | p. 71 |
| Password Histories | p. 72 |
| Minimum Age | p. 72 |
| Did Administrators Win? | p. 73 |
| Living with Passwords | p. 75 |
| Making Passwords Convenient | p. 76 |
| Remembering Passwords | p. 76 |
| Rhyming | p. 77 |
| Repetition | p. 78 |
| Visualization | p. 78 |
| Association | p. 79 |
| Humor and Irony | p. 80 |
| Chunking | p. 81 |
| Exaggeration | p. 81 |
| Offensiveness | p. 81 |
| Gripes | p. 82 |
| Other Memorization Tips | p. 82 |
| Typing Passwords | p. 82 |
| Key Loggers | p. 83 |
| Managing Passwords | p. 83 |
| The Difference Is Obscurity | p. 84 |
| Secret Questions | p. 87 |
| Summary | p. 91 |
| Ten Password Pointers: Building Strong Passwords | p. 93 |
| Introduction | p. 94 |
| Building Strong Passwords | p. 94 |
| Three Words | p. 94 |
| The E-Mail Address | p. 96 |
| The URL | p. 98 |
| The Title | p. 98 |
| Number Rhymes | p. 99 |
| Rhymes with One | p. 100 |
| Rhymes with Two | p. 100 |
| Rhymes with Three | p. 100 |
| Rhymes with Four | p. 101 |
| Rhymes with Five | p. 101 |
| Rhymes with Six | p. 101 |
| Rhymes with Seven | p. 101 |
| Rhymes with Eight | p. 101 |
| Rhymes with Nine | p. 102 |
| Get to the Point | p. 102 |
| The Confession | p. 103 |
| The Elbow Mambo | p. 103 |
| The Phone Number | p. 104 |
| Letter Swapping | p. 104 |
| Summary | p. 106 |
| The 500 Worst Passwords of All Time | p. 107 |
| The Worst Passwords | p. 108 |
| The Passwords | p. 109 |
| Another Ten Password Pointers Plus a Bonus Pointer | p. 113 |
| Password Complexity through Mangling | p. 114 |
| Diverse Dialects | p. 114 |
| Scrambling | p. 115 |
| Slicing and Dicing | p. 115 |
| Repetition | p. 115 |
| The Replacements | p. 116 |
| Over-punctuating | p. 116 |
| Slurring, Mumbling, and Stuttering | p. 117 |
| Non-words | p. 117 |
| Foreign and Slang | p. 117 |
| Typos | p. 118 |
| The Long Anticipated Valuable Bonus Tip | p. 118 |
| The Three Rules for Strong Passwords | p. 121 |
| Introduction | p. 122 |
| The Rule of Complexity | p. 122 |
| Three Elements | p. 122 |
| A Thousand Trillion | p. 122 |
| The Rule of Uniqueness | p. 123 |
| The Rule of Secrecy | p. 124 |
| Summary | p. 124 |
| Celebrate Password Day | p. 125 |
| Password Day | p. 126 |
| The Origin of Password Day | p. 126 |
| Celebrating Password Day | p. 127 |
| Summary | p. 128 |
| The Three Elements of Authentication | p. 129 |
| Multifactor Authentication | p. 130 |
| The Three Basics | p. 131 |
| Something You Know | p. 131 |
| Something You Have | p. 131 |
| Something You Are | p. 132 |
| Multiple Layers | p. 133 |
| Summary | p. 134 |
| Test Your Password | p. 135 |
| Random Seed Words | p. 137 |
| Complete Randomness | p. 159 |
| Index | p. 177 |
| Table of Contents provided by Ingram. All Rights Reserved. |
ISBN: 9781597490412
ISBN-10: 1597490415
Published: 1st December 2005
Format: Paperback
Language: English
Number of Pages: 182
Audience: Professional and Scholarly
Publisher: Syngress Media,U.S.
Country of Publication: US
Dimensions (cm): 22.23 x 14.61 x 1.27
Weight (kg): 0.24
Shipping
| Standard Shipping | Express Shipping | |
|---|---|---|
| Metro postcodes: | $9.99 | $14.95 |
| Regional postcodes: | $9.99 | $14.95 |
| Rural postcodes: | $9.99 | $14.95 |
Orders over $79.00 qualify for free shipping.
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In

Cloud Native Application Protection Platforms
A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
Paperback
RRP $125.75
$60.99
OFF























