These are the sources and citations used to research 3-2 Scenario Assignment Module Three: Hashing and Authentication Threats. This bibliography was generated on Cite This For Me on
In-text: ([closed], S. and S., 2022)
Your Bibliography: [closed], E., S., J. and S., J., 2022. Encrypting/Hashing plain text passwords in database. [online] Stack Overflow. Available at: <https://stackoverflow.com/questions/287517/encrypting-hashing-plain-text-passwords-in-database> [Accessed 24 January 2022].
In-text: (Password Hashing, 2022)
Your Bibliography: Docs.oracle.com. 2022. Password Hashing. [online] Available at: <https://docs.oracle.com/cd/E26180_01/Platform.94/ATGPersProgGuide/html/s0506passwordhashing01.html> [Accessed 24 January 2022].
In-text: (functions, T, Aner and Pornin, 2022)
Your Bibliography: functions, “., T, J., Aner, Y. and Pornin, T., 2022. “Double hashing” with 2 different hash functions. [online] Information Security Stack Exchange. Available at: <https://security.stackexchange.com/questions/11679/double-hashing-with-2-different-hash-functions> [Accessed 24 January 2022].
In-text: (Password Cracking Techniques Hackers Use and How to Avoid Them, 2022)
Your Bibliography: Password Cracking Techniques Hackers Use and How to Avoid Them. 2022. Password Cracking Techniques Hackers Use and How to Avoid Them. [online] Available at: <https://www.avg.com/en/signal/password-cracking-techniques-hackers-use> [Accessed 24 January 2022].
10,587 students joined last month!