Electronic mail and online safety (Sep 17, 2008) (beginner)
PPT
Chapter 4 Authentication Applications. Outline Threat, Vulnerability, Exploit Authentication Applications Kerberos X.509 Authentication Service Recommended.
Chapter 4