Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Chapter 15. Secure Personal Identification Strategies Using Smart Cards and Biometrics |
Категории
Chapter 15. Secure Personal Identification Strategies Using Smart Cards and Biometrics |
Категории