Perfect passwords selection, protection, authentication /
Wedi'i Gadw mewn:
| Prif Awdur: | |
|---|---|
| Awdur Corfforaethol: | |
| Awduron Eraill: | |
| Fformat: | Electronig eLyfr |
| Iaith: | Saesneg |
| Cyhoeddwyd: |
Rockland, Mass. :
Syngress,
2006.
|
| Pynciau: | |
| Mynediad Ar-lein: | An electronic book accessible through the World Wide Web; click to view |
| Tagiau: |
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
|
Eitemau Tebyg: Perfect passwords
- Instant Java password and authentication security /
- Essential computer security everyone's guide to e-mail, internet, and wireless security /
- Role-based access control
- Check Point NG next generation security administration /
- Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
- Linux firewalls attack detection and response with iptables, psad, and fwsnort /