Add Papers Marked0
Paper checked off!

Marked works

Viewed0

Viewed works

Shopping Cart0
Paper added to shopping cart!

Shopping Cart

Register Now

eKönyvtár library
FAQ
Special offers 2 Open

Great deal: today with a discount!

Regular price:
771 Ft
You save:
147 Ft
Discounted price*:
624 Ft
Purchase
Add to Wish List
ID number:287075
Evaluation:
Published: 02.01.2003.
Language: English
Level: Secondary school
Literature: n/a
References: Not used
Extract

Many commercial packages are designed with security features that control who can access the computer. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, possessed objects, and biometric devices.
With remembered information, a user is required to enter a word or series of characters that match an entry or security file in the computer. …

Load more similar papers

Send to email

Your name:

Enter an email address where the link will be sent:

Hi!
{Your name} suggests you to check out this eKönyvtár paper on „Computer Security”.

Link to paper:
https://eng.ekonyvtar.eu/w/287075

Send

Email has been sent

Choose Authorization Method

Email & Password

Email & Password

Wrong e-mail adress or password!
Log In

Forgot your password?

Facebook

Not registered yet?

Register and redeem free papers!

To receive free papers from eKönyvtár.com it is necessary to register. It's quick and will only take a few seconds.

If you have already registered, simply to access the free content.

Cancel Register