A three-pronged solution for identifying users

Visit Publisher Site
A three-pronged solution for identifying users Hosting Promo

Sponsored by TMDHosting

The problem of system security starts with discovering the identity of the user on the other end of the communications link. This article discusses three familiar approaches for identifying users, highlights their strengths and weaknesses (alone and in combinations), and provides some examples of each.

Visit publisher site: A three-pronged solution for identifying users

Listing Details

Filed in:
Scripts / Java / Tutorials & Tips / Security
Submitted on:
 
Last Updated:
Jun 5, 2001 
Publisher:
Other listings by this publisher

License & Pricing Information

Featured Marketplace Listings

User Reviews 

Be the first to review this listing!
Average Member Rating: 4.33/5