Authentication (chapter 31) How do you know that who you connect to is who they say they are? If you access an important document on-line, how can.
The Secure Environment
Security 0 The Secure Environment. Security 1 The Secure Environment Security goals (C.I.A.) and threats.