0 likes | 77 Views
Authentication (chapter 31). How do you know that who you connect to is who they say they are? If you access an important document on-line, how can you tell it has not been tampered with after it was posted?. Examples:. business site posts a document identifying who they are.
E N D