انضم إلينا في "بيندنج هوك لايف" في 27 أكتوبر في أندربيلي بوليفارد سوهو في لندن
انضم إلينا في بيندنج هوك لايف

كلمات المرور

This module explores the role of passwords in cybersecurity, covering their creation, management, and vulnerabilities, as well as strategies for strengthening password security to protect information.

البوابة > الأمن السيبراني > كلمات المرور

منشئ المناهج الدراسية

Honan, Mat. “How Apple and Amazon Security Flaws Led to My Epic Hacking.” Wired, August 6, 2012.

https://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/

Jagatic, Tom N., Nathaniel A. Johnson, Markus Jakobsson, and Filippo Menczer. “Social Phishing.” Communications of the ACM 50, no. 10 (October 1, 2007): 94–100.

https://doi.org/10.1145/1290958.1290968

Bonneau, Joseph, Cormac Herley, Paul C. van Oorschot, and Frank Stajano. “The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.” In 2012 IEEE Symposium on Security and Privacy, 553–67, 2012.

https://doi.org/10.1109/SP.2012.44

Adams, Anne, and Martina Angela Sasse. “Users Are Not the Enemy.” Communications of the ACM 42, no. 12 (December 1, 1999): 40–46.

https://doi.org/10.1145/322796.322806

Morris, Robert, and Ken Thompson. “Password Security: A Case History.” Communications of the ACM 22, no. 11 (November 1, 1979): 594–97.

https://doi.org/10.1145/359168.359172

شكراً لاشتراكك في نشرتنا الإخبارية!

Thank you! RSVP received for Honan, Mat. “How Apple and Amazon Security Flaws Led to My Epic Hacking.” Wired, August 6, 2012.

شكراً لك على تقديم الطلب! سنكون على تواصل معك.

Apply for: Honan, Mat. “How Apple and Amazon Security Flaws Led to My Epic Hacking.” Wired, August 6, 2012.

Honan, Mat. “How Apple and Amazon Security Flaws Led to My Epic Hacking.” Wired, August 6, 2012.

جاري التحميل...

جاري التحميل...