Video Screencast Help

Search

Search results

Abstract Access to computer services has conventionally been managed by means of secret passwords and centralized authentication databases. This method dates back to early timeshare systems. Now that applications have shifted to the Internet, it ...
Blog Entry by Doug McLean | 03 Sep 2004 | 1 comment