Nu se pretează? Nu contează! La noi puteți returna bunurile în 30 de zile
Cu un voucher cadou nu veți da greș. În schimbul voucherului, destinatarul își poate alege orice din oferta noastră.
30 de zile pentru retur bunuri
This unique book explores the use of cryptographic techniques in authentication and key distribution systems. Systems such as Kerberos, NetSP, SPX, TESS, and SESAME are analyzed and compared. Computer scientists, electrical engineers, networking specialists, and information technology professionals learn valuable cryptographic techniques--and why authentication and key distribution systems are likely to become the primary means for securing networks and distributed systems in the future.