Want to hire a development team?
No Images Added Yet

A three-pronged solution for identifying users

Rated4.3/5 (3 ratings)
Add to Favorites
Publisher
Three familiar approaches for identifying users, with examples of each.
Product Details

The problem of system security starts with discovering the identity of the user on the other end of the communications link. This article discusses three familiar approaches for identifying users, highlights their strengths and weaknesses (alone and in combinations), and provides some examples of each.

Report this Listing
Price
Free
Licence Type
Free
Views
2,233
Submitted on
5th June 2001
Last Updated
5th June 2001

You May Also Like

Cloud Services You May Like

Microsoft Azure App Service Deployment & Web Application Configuration

Deploy and configure Azure App Service for hosting web applications with secure access, performance tuning, and environm

Help/Fix on AWS Auto Scaling (1 Hour)

One hour of help to troubleshoot or fine tune AWS Auto Scaling behaviour.

1 Hour AWS issues/problems review and fix

One hour dedicated session to review and fix a specific AWS issue or problem.

Help/Fix on AWS Kubernetes Service(EKS) (1 Hour)

One hour of help or fixes for Kubernetes clusters running on AWS EKS.

User Reviews

Please rate the listing and tell the world know what do you think about the listing.
(3 ratings)
Average User Rating: 4.3/5
No reviews found.
Not yet reviewed by any member. You can be the first one to write a review for this listing.Click hereto submit your review.