PreparED Study Materials
Week 6 - Lecture 6 - Chapter 3: User Authentication
Author: Student Professor: Mohamed Tamer Abdelrahman Refaei Term:
We begin our discussion around the authentication process, and how users are granted access to certain domains, or systems. Typically, there is a process of password checking with a given username and assuring the person is authorized to enter wherever they are trying to log into.
CSCI 4531 also has
Lecture 2 - encryption (Computer science)
CSCI 4531
George Washington University
5 pages | Fall 2016