Scrutinizing Windows Authentication.

Item request has been placed! ×
Item request cannot be made. ×
  Processing Request
  • Additional Information
    • NAICS/Industry Codes:
      443144 Computer and software stores
      423430 Computer and Computer Peripheral Equipment and Software Merchant Wholesalers
      417310 Computer, computer peripheral and pre-packaged software merchant wholesalers
      511211 Software publishers (except video game publishers)
    • Abstract:
      Focuses on the basics of Windows authentication and its related protocols. Components of access-control systems; Need of the protocols to secure authentication transactions and store authentication password; Steps to defeat password crackers and resetters.
    • ISSN:
      1555-4686
    • Accession Number:
      17521051
  • Citations
    • ABNT:
      Scrutinizing Windows Authentication. Windows IT Security, [s. l.], v. 5, n. 6, p. 11–15, 2005. Disponível em: http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=bth&AN=17521051&authtype=sso&custid=s5834912. Acesso em: 28 jan. 2020.
    • AMA:
      Scrutinizing Windows Authentication. Windows IT Security. 2005;5(6):11-15. http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=bth&AN=17521051&authtype=sso&custid=s5834912. Accessed January 28, 2020.
    • APA:
      Scrutinizing Windows Authentication. (2005). Windows IT Security, 5(6), 11–15. Retrieved from http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=bth&AN=17521051&authtype=sso&custid=s5834912
    • Chicago/Turabian: Author-Date:
      “Scrutinizing Windows Authentication.” 2005. Windows IT Security 5 (6): 11–15. http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=bth&AN=17521051&authtype=sso&custid=s5834912.
    • Harvard:
      ‘Scrutinizing Windows Authentication’ (2005) Windows IT Security, 5(6), pp. 11–15. Available at: http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=bth&AN=17521051&authtype=sso&custid=s5834912 (Accessed: 28 January 2020).
    • Harvard: Australian:
      ‘Scrutinizing Windows Authentication’ 2005, Windows IT Security, vol. 5, no. 6, pp. 11–15, viewed 28 January 2020, .
    • MLA:
      “Scrutinizing Windows Authentication.” Windows IT Security, vol. 5, no. 6, June 2005, pp. 11–15. EBSCOhost, widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=bth&AN=17521051&authtype=sso&custid=s5834912.
    • Chicago/Turabian: Humanities:
      “Scrutinizing Windows Authentication.” Windows IT Security 5, no. 6 (June 2005): 11–15. http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=bth&AN=17521051&authtype=sso&custid=s5834912.
    • Vancouver/ICMJE:
      Scrutinizing Windows Authentication. Windows IT Security [Internet]. 2005 Jun [cited 2020 Jan 28];5(6):11–5. Available from: http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=bth&AN=17521051&authtype=sso&custid=s5834912