Search Results - "password"

Refine Results
  1. 1

    The password seripts and poems for reading aloud

    Published 1994
    Book
  2. 2
  3. 3

    Dynamic analysis on pixel value graphical password scheme by Mohd Sidek Fadhil Mohd Yunus

    Published 2017
    Thesis Book
  4. 4

    Sistem perkongsian Precis menggunakan ONE TIME PASSWORD by Aiman Syafiq Md. Sanin

    Published 2016
    Thesis Book
  5. 5

    Aplikasi password generator bagi pengguna di Universiti Pertahanan Malaysia by Mohamad Mohd Nor

    Published 2010
    Thesis Book
  6. 6

    Sistem kata laluan menggunakan pendekatan Query Directed Password (QDP) by Muhammad Azfar Baharudin

    Published 2011
    Thesis Book
  7. 7

    Smart switch socket outlet security system using dongle and password method by Mohd. Faizul Zakaria

    Published 2008
    Thesis Book
  8. 8

    A NOVEL GRAPHICAL PASSWORD CLUSTERING METHOD FOR FAULT TOLERANCE MECHANISM by Mohd Sidek Fadhil Mohd Yunus

    Published 2020
    Thesis Book
  9. 9

    Sistem kata laluan menggunakan pendekatan kaedah graphical query directed password (QDP) by Hijrahtul Sakinah Abd Razak

    Published 2012
    Thesis Book
  10. 10

    Sistem kata laluan berasaskan teori kinestetik menggunakan pergerakan klik tetikus = password system based on kinesthetic theory using the movement of mouse click by Rafizul Jos

    Published 2012
    “…Password system based on kinesthetic theory using the movement of mouse click…”
    Thesis Book
  11. 11
  12. 12
  13. 13

    Identity and data security for web development best practices by LeBlanc, Jonathan, Messerschmidt, Tim

    Published 2016
    Table of Contents: “…Introduction -- Password encryption, hashing, and salting -- Identity security fundamentals -- Securing the login with OAuth 2 and OpenID connect -- Alternate methods of identification -- Hardening web applications -- Data transmission security…”
    Book
  14. 14

    Learning Kali Linux security testing, penetration testing, and ethical hacking by Messier, Ric

    Published 2018
    Table of Contents: “…Foundations of Kali Linux -- Network security testing basics -- Reconnaissance -- Looking for vulnerabilities -- Automated exploits -- Owning metasploit -- Wireless security testing -- Web application testing -- Cracking passwords -- Advanced techniques and concepts -- Reporting…”
    Book
  15. 15

    Securing SQL server protecting your database from attackers by Cherry, Denny

    Published 2015
    Table of Contents: “…Identifying Security Requirements -- Securing the Network --Key Management -- Database Encryption -- SQL Password Security -- Securing the Instance -- Auditing for Security -- SQL Injection Attacks -- Securing Data -- SQL Server Agent Security -- Server Rights…”
    Book
  16. 16

    Firewalls don't stop dragons a step-by-step guide to computer security for non-techies by Parker, Carey

    Published 2018
    Table of Contents: “…Before we begin -- Cybersecurity 101 -- The three ups : back up, clean up, and update -- Passwords -- Computer security -- LAN sweet LAN -- Practice safe surfing -- Secure communication -- Online accounts and social media -- Parental guidance -- Don't be a smartphone dummy -- Odds and ends -- Parting thoughts -- Glossary…”
    Book
  17. 17

    Computer security and penetration testing by Basta, Alfred

    Published 2008
    Table of Contents: “…Ethics of hacking and cracking -- Reconnaissance -- Scanning tools -- Sniffers -- TCP/IP vulnerabilities -- Encryption and password cracking -- Spoofing -- Session hijacking -- Hacking network devices -- Trojan horses -- Denial-of-service attacks -- Buffer overflows -- Programming exploits -- Mail vulnerabilities -- Web application vulnerabilities -- Windows vulnerabilities -- Linux vulnerabilities -- Incident handling…”
    Book
  18. 18

    The basics of digital privacy simple tools to protect your personal your information and your identity online by Cherry, Denny

    Published 2014
    Table of Contents: “…Turning cookies off in Internet ExplorerTurning cookies off in Firefox; Turning cookies off in Chrome; Turning off cookies in Safari; Summary -- Chapter 2: Usernames and Passwords for Websites; Picking a username; Picking a password; How passwords are figured out; Unique passwords; Creating unique passwords; Passphrases; Two-factor authentication; Using fob-based systems; Using software-based two-factor authentication systems; Using a text-messaging-based system; The more important the longer they should be; Summary -- Chapter 3: Your Home Network; Securing your home network; Securing your router. …”
    Book
  19. 19

    Anti-hacker tool kit by Shema, Mike

    Published 2014
    Table of Contents: “…Web Application Hacking -- 15. Password Cracking and Brute-Force Tools -- pt. V. Forensics -- 16. …”
    Book
  20. 20

    The CEH prep guide the comprehensive guide to certified ethical hacking by Krutz, Ronald L. 1938

    Published 2008
    Table of Contents: “…The business and legal issues of ethical hacking -- Introduction to hacking -- Ethics and legality -- Penetration testing for business -- The pre-attack phases -- Footprinting -- Scanning -- Enumerating -- Attack techniques and tools -- System hacking techniques -- Trojans, backdoors, and sniffers -- Denial of service attacks and session hijacking -- Penetration testing steps -- Linus hacking tools -- Social engineering and physical security -- Web server and database attacks -- Web server hacking and Web application vulnerabilities -- SQL injection vulnerabilities -- Cryptography -- Cracking Web passwords -- Advanced topics -- Wireless network attacks and countermeasures -- Firewalls, intrusion detection systems and honeypots -- Viruses, worms, and buffer overflows -- Answers to sample questions -- Glossary of terms and acronyms -- What's on the CD.…”
    Book