{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:49Z","timestamp":1750307929079,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231051","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"13-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Ethical hacking and password cracking"],"prefix":"10.1145","author":[{"given":"Robin","family":"Snyder","sequence":"first","affiliation":[{"name":"Savannah State University"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Hacking Exposed","author":"McClure S.","year":"2005","unstructured":"McClure , S. , Scambray , J. , &amp; Kurtz , G. Hacking Exposed . New York : McGraw-Hill Osborne Media , 2005 . McClure, S., Scambray, J., &amp; Kurtz, G. Hacking Exposed. New York: McGraw-Hill Osborne Media, 2005."},{"key":"e_1_3_2_1_2_1","volume-title":"digital security in a networked world","author":"Schneier B.","year":"2000","unstructured":"Schneier , B. Secrets &amp; lies : digital security in a networked world . New York : John Wiley & amp; Sons, Inc., 2000 . Schneier, B. Secrets &amp; lies: digital security in a networked world. New York: John Wiley &amp; Sons, Inc., 2000."},{"key":"e_1_3_2_1_3_1","volume-title":"Hands-On Ethical Hacking and Network Defense","author":"Simpson M.","year":"2005","unstructured":"Simpson , M. Hands-On Ethical Hacking and Network Defense . Boston, MA : Course Technology , 2005 . Simpson, M. Hands-On Ethical Hacking and Network Defense. Boston, MA: Course Technology, 2005."},{"key":"e_1_3_2_1_4_1","volume-title":"Authentication: From Passwords to Public Keys","author":"Smith R.","year":"2001","unstructured":"Smith , R. Authentication: From Passwords to Public Keys . Boston, MA : Addison-Wesley Professional , 2001 . Smith, R. Authentication: From Passwords to Public Keys. Boston, MA: Addison-Wesley Professional, 2001."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 31st Annual Conference of the International Business Schools Computing Association (Daytona Beach, FL , July 13--16","author":"Snyder R.","year":"2003","unstructured":"Snyder , R. , IIS security considerations of the FileSystemObject for cooperating and uncooperating users , In Proceedings of the 31st Annual Conference of the International Business Schools Computing Association (Daytona Beach, FL , July 13--16 , 2003 ). Snyder, R., IIS security considerations of the FileSystemObject for cooperating and uncooperating users, In Proceedings of the 31st Annual Conference of the International Business Schools Computing Association (Daytona Beach, FL , July 13--16, 2003)."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 27th Annual Conference of the Association of Small Computer Users in Education. (Myrtle Beach, SC , June 12--16","author":"Snyder R.","year":"1994","unstructured":"Snyder , R. , Proactive approaches to information systems and computer security , In Proceedings of the 27th Annual Conference of the Association of Small Computer Users in Education. (Myrtle Beach, SC , June 12--16 , 1994 ). Snyder, R., Proactive approaches to information systems and computer security, In Proceedings of the 27th Annual Conference of the Association of Small Computer Users in Education. (Myrtle Beach, SC , June 12--16, 1994)."},{"key":"e_1_3_2_1_7_1","volume-title":"39th Annual Conference of the Association of Small Computer Users in Education","author":"Snyder R.","year":"2006","unstructured":"Snyder , R. , Using ethical hacking to educate users about secure passwords by cracking insecure passwords using readily available software . In 39th Annual Conference of the Association of Small Computer Users in Education ( Myrtlie Beach, SC, June 11--15 , 2006 ) . Snyder, R., Using ethical hacking to educate users about secure passwords by cracking insecure passwords using readily available software. In 39th Annual Conference of the Association of Small Computer Users in Education (Myrtlie Beach, SC, June 11--15, 2006) ."}],"event":{"name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","acronym":"InfoSecCD06","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231051","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231051"}},"subtitle":["a pattern for individualized security exercises"],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":7,"alternative-id":["10.1145\/1231047.1231051","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231051","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}