-
1
-
-
38649127978
-
Empirical test of a hacking model: An exploratory study
-
Bento, A., and Bento, R. (2004). Empirical Test of a Hacking Model: An Exploratory Study. Communications of the Association for Information Systems, 14:32, 678-690.
-
(2004)
Communications of the Association for Information Systems
, vol.14
, Issue.32
, pp. 678-690
-
-
Bento, A.1
Bento, R.2
-
2
-
-
54949112302
-
Future security approaches and biometrics
-
Boukhonine, S., Krotov, V., and Rupert, B. (2005). Future Security Approaches and Biometrics. Communications of the Association for Information Systems, 16:48, 937-966.
-
(2005)
Communications of the Association for Information Systems
, vol.16
, Issue.48
, pp. 937-966
-
-
Boukhonine, S.1
Krotov, V.2
Rupert, B.3
-
3
-
-
18544374846
-
Evaluation of the human impact of password authentication practices on information security
-
Carstens, D. S., McCauley-Bell, P., Malone, L. C., and DeMara, R. F. (2004). Evaluation of the Human Impact of Password Authentication Practices on Information Security. Informing Science Journal, 7:1, 67-85.
-
(2004)
Informing Science Journal
, vol.7
, Issue.1
, pp. 67-85
-
-
Carstens, D.S.1
McC-BELLauley-Bell, P.2
Malone, L.C.3
DeMara, R.F.4
-
4
-
-
38549085184
-
-
New York: McGraw-Hill
-
Conklin, A., White, G., Cothren, C., Williams, D., and Davis, R. L. (2004). Principles of Computer Security: Security+ and Beyond. New York: McGraw-Hill.
-
(2004)
Principles of Computer Security: Security+ and Beyond
-
-
Conklin, A.1
White, G.2
Cothren, C.3
Williams, D.4
Davis, R.L.5
-
5
-
-
84869135566
-
-
http://fedora.redhat.com/ (accessed February 2006)
-
Fedora. (2006). Fedora Core 5, http://fedora.redhat.com/ (accessed February 2006).
-
(2006)
Fedora Core 5
-
-
-
6
-
-
18844456006
-
Have you met your organization's computer usage policy?
-
Foltz, C. B., Cronan, T. P., and Jones, T. W. (2005). Have you met your organization's computer usage policy? Industrial Management & Data Systems, 105:2, 137-146.
-
(2005)
Industrial Management & Data Systems
, vol.105
, Issue.2
, pp. 137-146
-
-
Foltz, C.B.1
Cronan, T.P.2
Jones, T.W.3
-
7
-
-
0033633028
-
Authentication and supervision: A survey of user attitudes
-
Furnell, S. M., Dowland, P. S., Illingworth, H. M., and Reynolds, P. L. (2000). Authentication and Supervision: A Survey of User Attitudes. Computers & Security, 19:6, 529-539.
-
(2000)
Computers & Security
, vol.19
, Issue.6
, pp. 529-539
-
-
Furnell, S.M.1
Dowland, P.S.2
Illingworth, H.M.3
Reynolds, P.L.4
-
8
-
-
12344260479
-
One born every minute
-
Haggerty, J., and Taylor, M. (2005). One born every minute. ITNOW, 47, 26-27.
-
(2005)
ITNOW
, vol.47
, pp. 26-27
-
-
Haggerty, J.1
Taylor, M.2
-
9
-
-
4243096135
-
The domino effect of password reuse
-
Ives, B., Walsh, K. R., and Schneider, H. (2004). The Domino Effect of Password Reuse. Communications of the ACM, 47:4, 75-78.
-
(2004)
Communications of the ACM
, vol.47
, Issue.4
, pp. 75-78
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
11
-
-
0002619432
-
Binary codes capable of correcting deletions, insertions, and reversals
-
Levenshtein, V. (1965). Binary codes capable of correcting deletions, insertions, and reversals. Problems in Information Transmission, 1, 8-17.
-
(1965)
Problems in Information Transmission
, vol.1
, pp. 8-17
-
-
Levenshtein, V.1
-
12
-
-
84869127543
-
-
http://www.microsoft.com/technet/prodtechnol/ windowsserver2003/technologies/directory/activedirectory/ stepbystep/strngpw.mspx#EMD (accessed June 2006)
-
Microsoft. (2006). Step-by-Step Guide to Enforcing Strong Password Policies. http://www.microsoft.com/technet/prodtechnol/ windowsserver2003/technologies/directory/activedirectory/ stepbystep/strngpw.mspx#EMD (accessed June 2006).
-
(2006)
Step-By-Step Guide to Enforcing Strong Password Policies
-
-
-
16
-
-
85024007549
-
-
http://securityresponse.symantec.com/ avcenter/venc/data/ppauditor.html (accessed June 20, 2006)
-
Symantec. (2006a). PPAuditor, http://securityresponse.symantec.com/ avcenter/venc/data/ppauditor.html (accessed June 20, 2006).
-
(2006)
Ppauditor
-
-
-
17
-
-
84869141231
-
-
http://securityresponse.symantec. com/avcenter/venc/data/rainbowcrack.html (accessed June 20, 2006)
-
Symantec. (2006b). RainbowCrack, http://securityresponse.symantec. com/avcenter/venc/data/rainbowcrack.html (accessed June 20, 2006).
-
(2006)
Rainbowcrack
-
-
-
18
-
-
12844275960
-
-
IEEE Security and Privacy, September/October, 25-30
-
Yan, J., Blackwell, A., Anderson, R., and Grant, A. (2004). Password Memorability and Security: Empirical Results. IEEE Security and Privacy, September/October, 25-30.
-
(2004)
Password Memorability and Security: Empirical Results
-
-
Yan, J.1
Blackwell, A.2
Erson, R.3
Grant, A.4
-
19
-
-
15744386905
-
Breaking an improved password authenticated key exchange protocol for imbalanced wireless networks
-
Zhang, M. (2005). Breaking an Improved Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks. IEEE Communications Letters, 9:3, 276-278.
-
(2005)
IEEE Communications Letters
, vol.9
, Issue.3
, pp. 276-278
-
-
Zhang, M.1
|