![Password Management: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors](//coverdb.com/reviewSE/w100/9cd/9781743045015.jpg) |
|
Password Management: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
kevin (author) roebuck
Print on Demand (Paperback). tebbo 2011-06-06.
ISBN 9781743045015
|
|
|
Hitta bokens lägsta pris
|
Förlagets beskrivning
There are several forms of software used to help users or organizations better manage passwords:
Intended for use by a single user: Password manager software is used by individuals to organize and encrypt many personal passwords. This is also referred to as a password wallet.
Intended for use by a multiple users/groups of users: Password synchronization software is used by organizations to arrange for different passwords, on different systems, to have the same value when they belong to the same person. Self-service password reset software enables users who forgot their password or triggered an intruder lockout to authenticate using another mechanism and resolve their own problem, without calling an IT help desk. Enterprise Single signon software monitors applications launched by a user and automatically populates login IDs and passwords. Web single signon software intercepts user access to web applications and either inserts authentication information into the HTTP(S) stream or redirects the user to a separate page, where the user is authenticated and directed back to the original URL. Privileged password management software.
This book is your ultimate resource for Password Management. Here you will find the most up-to-date information, analysis, background and everything you need to know.
In easy to read chapters, with extensive references and links to get you to know all there is to know about Password Management right away, covering: Password management, Password, 1dl, 2D Key, ATM SafetyPIN software, Canonical account, Challenge-Handshake Authentication Protocol, Challenge-response authentication, Cognitive password, Default password, Diceware, Draw a Secret, Duress code, LM hash, Munged password, One-time password, OpenID, OTPW, Partial Password, Passmap, PassPattern system, Passphrase, Password authentication protocol, Password cracking, Password fatigue, Password length parameter, Password manager, Password notification e-mail, Password policy, Password strength, Password synchronization, Password-authenticated key agreement, PBKDF2, Personal identification number, Pre-shared key, Privileged password management, Random password generator, Risk-based authentication, S/KEY, Secure Password Authentication, Secure Remote Password protocol, SecurID, Self-service password reset, Shadow password, Single sign-on, Swordfish (password), Windows credentials, Zero-knowledge password proof, Account aggregation, Billeo, Bitser software, Factotum (software), GNOME Keyring, IVault, KeePass, Keychain (Mac OS), KWallet, KYPS, LastPass, Mitto, Password Safe, Roboform, Seahorse (software), Sticky Password Manager, Identity management, Windows CardSpace, CCSO Nameserver, Certification on demand, Common Indexing Protocol, Credential, Digital identity, Directory information tree, Directory System Agent, Electronic authentication, Federated identity, Federated identity management, Federated Naming Service, Future of Identity in the Information Society, Group (computing), Identity access management, Identity as a service, Identity assurance, Identity Assurance Framework, Identity change, Identity Governance Framework, Identity intelligence, Identity management system, Identity Management Theory, Identity metasystem, Identity score, Information Card, Information Card Foundation, Liberty Alliance, Scott Mitic, Mobile identity management, Mobile signature, Mobile Signature Roaming, Multi-master replication, Novell Storage Manager, Online identity management, Oracle Identity Management, Organizational Unit, Privacy, Privacy-enhancing technologies, Profiling practices, Service Provisioning Markup Language, Trombinoscope, User profile...and much more.
This book explains in-depth the real drivers and workings of Password Management. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Password Management with the objectivity of experienced professionals
Fler böcker av kevin (author) roebuck
Liknande böcker
Recensioner
Den här boken har tyvärr inte några recensioner ännu. Om du redan läst boken, skriv en recension!
Recensera boken
Skriv en recension och dela dina åsikter med andra. Försök att fokusera på bokens innehåll. Läs våra instruktioner för mer information.
Password Management: High-impact Strategies
Bokrecensioner » Password Management: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
|
|
![Password Management: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors](/images/background.gif) |