A What Is The Books Recommended Password Policy For Length

(a) What is the book’s recommended password policy for length and complexity?
(b) How can password-cracking programs be used to enforce password strength policy?
(c) Before you run a password-cracking program on your company’s computers to check for weak passwords, what should you do?

Posted in Uncategorized