Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

    Chapter 15.  Secure Personal Identification Strategies Using Smart Cards and Biometrics

Категории