
FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
|
|
- Title: Password
- Author(s) Martin Paul Eve
- Publisher: Bloomsbury Academic (July 28, 2016); eBook (Creative Commons Licensed)
- License(s): Creative Commons License (CC)
- Hardcover: 136 pages
- eBook: PDF
- Language: English
- ISBN-10/ASIN: 1501314874
- ISBN-13: 978-1501314872
- Share This:
![]() |
Where does a password end and an identity begin? A person might be more than his chosen ten-character combination, but does a bank know that? Or an email provider? What's an 'identity theft' in the digital age if not the unauthorized use of a password?
About the Authors- Martin Paul Eve is Professor of Literature, Technology and Publishing at Birkbeck College, University of London, UK.

-
Password Incorrect (Nick Name)
25 short, sometimes funny and sometimes mean stories ideal to rediscover the joy of reading a book as shiny and beautiful as a brand new cell phone. A lot of entertainment and a little food for thought.
-
Hash Crack: Password Cracking Manual (Joshua Picolet)
A compilation of basic and advanced techniques to assist penetration testers and network security professionals evaluate their organization's posture. It contains syntax and examples for the most popular cracking and analysis tools.
-
Unauthorized Access: The Crisis in Online Privacy and Security
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security.
-
Security of Ubiquitous Computing Systems (Gildas Avoine, et al)
It is to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework that lies along four axes: cryptographic models, cryptanalysis of building blocks, security engineering, and security assessment.
-
Security Concepts (Subspacefield)
This is a book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.
-
Rational Cybersecurity for Business (Daniel Blum)
This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience.
-
Security Engineering: Building Dependable Distributed Systems
It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.
-
Web Application Security: Exploitation and Countermeasures
This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. It introduces three pillars of web application security: recon, offense, and defense.
-
Handbook of Digital Face Manipulation and Detection
This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the both biometrics and media forensics fields.
-
Demystifying Internet of Things Security (Sunil Cheruvu, et al)
This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. It provides clarity to industry professionals and provides and overview of different security solutions.
-
Next-Generation Firewalls For Dummies (Palo Alto Networks)
This book will show you how to rethink your security strategy to counter and block even the most sophisticated attacks, help you understand what firewalls are, how they operate on different types of networks, what they can and can't do, and how to pick a good one.
-
Advances in Security in Computing and Communications
This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It covers cryptography, network security, and security and privacy issues in the Internet of Things (IoT).
:
|
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |