Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597490412
    Language: English
    Pages: 1 online resource (182 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements. A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember. * Examines the password problem from the perspective of the administrator trying to secure their network * Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot * Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords
    Note: Online resource; Title from title page (viewed January 9, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781932266658
    Language: English
    Pages: 1 online resource (550 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, Hacking the Code dives right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations is included in both the Local and Remote Code sections of the book. The book is accompanied with a FREE COMPANION CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD also contains a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions simplify exploit and vulnerability tool development to an extent never before possible with publicly available software. Learn to quickly create security tools that ease the burden of software testing and network administration Find out about key security issues regarding vulnerabilities, exploits, programming flaws, and secure code development Discover the differences in numerous types of web-based attacks so that developers can create proper quality assurance testing procedures and tools Learn to automate quality assurance, management, and development tasks and procedures for testing systems and applications Learn to write complex Snort rules based solely upon traffic generated by network tools and exploits
    Note: Online resource; Title from title page (viewed May 10, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781350359222
    Language: English
    Pages: 1 online resource (209 pages)
    Edition: 1st ed.
    Series Statement: Shakespeare and Adaptation Series
    Parallel Title: Erscheint auch als
    DDC: 822.3/3
    Abstract: Intro -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Contributors -- Acknowledgements -- Note on the text -- Introduction: Shakespeare and his social circle on the stage and screen, 1998-2023 -- Notes -- References -- Part I: Author -- Chapter 1: Shakespeare regrets: Redefining the heritage biopic in All Is True -- The documentary tradition -- The heritage biopic -- English verdure, English comfort -- The usable past -- Chapter 2: 'I'll drown my book': Imagining Shakespeare's Long Lost First Play -- Act 1: I'll call for pen and ink and write my mind -- Act 2: Do you believe in magic? -- Act 3: Admit me, Chorus -- Act 4: Things have changed -- Act 5: Reflections -- Chapter 3: 'Scarce . . . a blot in his papers': Shakespearean inspiration on screen -- Configuring the playwright: the 1623 Folio -- Genius: debunked and restored -- Shakespeare in Love (Madden, 1998) -- Shakespeare Writing Julius Caesar (Méliès, 1907) -- Prospero's Books (Greenaway, 1991) -- Chapter 4: Interview on co-writing and performing in Bill (dir. Bracewell, 2015) Laurence Rickard in conversation with Ronan Hatfull and Edel Semple -- Chapter 5: 'The thing is, you're a douche': Fourth wave feminist representations of Shakespeare in Emilia and &amp -- Juliet -- Part II: Family -- Chapter 6: Shakespeare's dead, long live his widow! One-woman plays about Anne Hathaway -- Chapter 7: Interview on playing Sue Shakespeare in Upstart Crow (BBC, 2016-21) Helen Monks in conversation with Ronan Hatfull and Edel Semple -- Chapter 8: Father Shakespeare: Grieving for Hamnet on stage and screen -- Tragedy in Bardcom: Upstart Crow (2016-18) -- Hamnet on stage (2017) -- Shakespeare's interminable grief: All is True (2018) -- Conclusion: O'Farrell's Hamnet (2020) -- Chapter 9: Shakespeare and son in All Is True and O'Farrell's Hamnet.
    Note: Description based on publisher supplied metadata and other sources
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress | Boston, Mass. :Safari Books Online
    ISBN: 1932266526 , 9781932266528
    Language: English
    Keywords: Microsoft log parser ; Parsing (Computer grammar) ; Software ; Data mining ; Handbooks, manuals, etc ; File organization (Computer science) ; Handbooks, manuals, etc ; Electronic books ; local ; Electronic books
    Abstract: Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products. System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.), and hardware devices (firewalls, routers, etc.) that generate incredibly long and detailed log files of all activity on the particular application or device. This book will teach administrators how to use Microsoft's Log Parser to data mine all of the information available within these countless logs. The book teaches readers how all queries within Log Parser work (for example: a Log Parser query to an Exchange log may provide information on the origin of spam, viruses, etc.). Also, Log Parser is completely scriptable and customizable so the book will provide the reader with hundreds of original, working scripts that will automate these tasks and provide formatted charts and reports detailing the results of the queries. Written by Microsoft's sole developer of Log Parser, this is the first book available on the powerful yet completely undocumented product that ships with Microsoft's IIS, Windows Advanced Server 2003, and is available as a free download from the Microsoft Web site This book and accompanying scripts will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...