Professional Documents
Culture Documents
On Enforcing The Use of High Entropy Passwords in Linux Systems (Template)
On Enforcing The Use of High Entropy Passwords in Linux Systems (Template)
Page 1 of 3
{Your Name} – {Your Student Number} – Network Scripting ICA 1
Page 2 of 3
{Your Name} – {Your Student Number} – Network Scripting ICA 1
TODO:
12. You should add at least 1 more
reference, but ideally you should
add 2 more. We suggest that you
use Google Scholar, but you can
also use plain old Google.
Remember that, as a Teesside
University student, you are
expected to use Harvard
Referencing. Use the Word
reference manager to make this
easy! (5%)
Page 3 of 3