Search Results - "password"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 12
- Security measures 12
- Computer security 8
- Access control 4
- Graphic methods 3
- Data protection 2
- Examinations 2
- Artificial intelligence 1
- Business enterprises 1
- Client/server computing 1
- Computational intelligence 1
- Computer crimes 1
- Computer hackers 1
- Computer network 1
- Computers 1
- Database security 1
- Electronic information resources 1
- English language 1
- English poetry 1
- Foreign speakers 1
- Hacking 1
- Investigation 1
- Operational art (Military science) 1
- Penetration testing (Computer security) 1
- SQL server 1
- Study and teaching 1
- Testing 1
- Web site development 1
- access control 1
- security measures 1
-
1
-
2
-
3
-
4
-
5
Aplikasi password generator bagi pengguna di Universiti Pertahanan Malaysia
Published 2010Thesis Book -
6
-
7
Smart switch socket outlet security system using dongle and password method
Published 2008Thesis Book -
8
A NOVEL GRAPHICAL PASSWORD CLUSTERING METHOD FOR FAULT TOLERANCE MECHANISM
Published 2020Thesis Book -
9
Sistem kata laluan menggunakan pendekatan kaedah graphical query directed password (QDP)
Published 2012Thesis Book -
10
Sistem kata laluan berasaskan teori kinestetik menggunakan pergerakan klik tetikus = password system based on kinesthetic theory using the movement of mouse click
Published 2012“…Password system based on kinesthetic theory using the movement of mouse click…”
Thesis Book -
11
-
12
-
13
Identity and data security for web development best practices
Published 2016Table of Contents: “…Introduction -- Password encryption, hashing, and salting -- Identity security fundamentals -- Securing the login with OAuth 2 and OpenID connect -- Alternate methods of identification -- Hardening web applications -- Data transmission security…”
Book -
14
Learning Kali Linux security testing, penetration testing, and ethical hacking
Published 2018Table of Contents: “…Foundations of Kali Linux -- Network security testing basics -- Reconnaissance -- Looking for vulnerabilities -- Automated exploits -- Owning metasploit -- Wireless security testing -- Web application testing -- Cracking passwords -- Advanced techniques and concepts -- Reporting…”
Book -
15
Securing SQL server protecting your database from attackers
Published 2015Table of Contents: “…Identifying Security Requirements -- Securing the Network --Key Management -- Database Encryption -- SQL Password Security -- Securing the Instance -- Auditing for Security -- SQL Injection Attacks -- Securing Data -- SQL Server Agent Security -- Server Rights…”
Book -
16
Firewalls don't stop dragons a step-by-step guide to computer security for non-techies
Published 2018Table of Contents: “…Before we begin -- Cybersecurity 101 -- The three ups : back up, clean up, and update -- Passwords -- Computer security -- LAN sweet LAN -- Practice safe surfing -- Secure communication -- Online accounts and social media -- Parental guidance -- Don't be a smartphone dummy -- Odds and ends -- Parting thoughts -- Glossary…”
Book -
17
Computer security and penetration testing
Published 2008Table of Contents: “…Ethics of hacking and cracking -- Reconnaissance -- Scanning tools -- Sniffers -- TCP/IP vulnerabilities -- Encryption and password cracking -- Spoofing -- Session hijacking -- Hacking network devices -- Trojan horses -- Denial-of-service attacks -- Buffer overflows -- Programming exploits -- Mail vulnerabilities -- Web application vulnerabilities -- Windows vulnerabilities -- Linux vulnerabilities -- Incident handling…”
Book -
18
The basics of digital privacy simple tools to protect your personal your information and your identity online
Published 2014Table of Contents: “…Turning cookies off in Internet ExplorerTurning cookies off in Firefox; Turning cookies off in Chrome; Turning off cookies in Safari; Summary -- Chapter 2: Usernames and Passwords for Websites; Picking a username; Picking a password; How passwords are figured out; Unique passwords; Creating unique passwords; Passphrases; Two-factor authentication; Using fob-based systems; Using software-based two-factor authentication systems; Using a text-messaging-based system; The more important the longer they should be; Summary -- Chapter 3: Your Home Network; Securing your home network; Securing your router. …”
Book -
19
Anti-hacker tool kit
Published 2014Table of Contents: “…Web Application Hacking -- 15. Password Cracking and Brute-Force Tools -- pt. V. Forensics -- 16. …”
Book -
20
The CEH prep guide the comprehensive guide to certified ethical hacking
Published 2008Table of Contents: “…The business and legal issues of ethical hacking -- Introduction to hacking -- Ethics and legality -- Penetration testing for business -- The pre-attack phases -- Footprinting -- Scanning -- Enumerating -- Attack techniques and tools -- System hacking techniques -- Trojans, backdoors, and sniffers -- Denial of service attacks and session hijacking -- Penetration testing steps -- Linus hacking tools -- Social engineering and physical security -- Web server and database attacks -- Web server hacking and Web application vulnerabilities -- SQL injection vulnerabilities -- Cryptography -- Cracking Web passwords -- Advanced topics -- Wireless network attacks and countermeasures -- Firewalls, intrusion detection systems and honeypots -- Viruses, worms, and buffer overflows -- Answers to sample questions -- Glossary of terms and acronyms -- What's on the CD.…”
Book


