Back to Results
First PageMeta Content
Computer security / Computing / Cryptography / Computer access control / Access control / Password / Security / Cryptographic protocols / Authentication / Digest access authentication / SAP Logon Ticket


C HA PT E R 9 Implementing Web Security Using auth-lib.pl OVERVIEW A natural extension of most applications is the capability to restrict or track access through the application. To do this, we need a system
Add to Reading List

Document Date: 2003-08-09 07:16:17


Open Document

File Size: 351,59 KB

Share Result on Facebook
UPDATE