000252224 000__ 00838pam\a22002894a\45e0 000252224 001__ 252224 000252224 005__ 20210513095129.0 000252224 008__ 010627s2002\\\\maua\\\\\b\\\\001\0\eng\\ 000252224 010__ $$a 2001046001 000252224 015__ $$aGBA1-W4745 000252224 019__ $$a47676420$$a48418567 000252224 020__ $$a0201615991 (pbk.) 000252224 035__ $$a(OCoLC)ocm47238879 000252224 035__ $$a252224 000252224 040__ $$aDLC$$cDLC$$dUKM$$dC#P 000252224 042__ $$apcc 000252224 049__ $$aISEA 000252224 05000 $$aQA76.9.A25$$bS65 2002 000252224 08200 $$a005.8$$221 000252224 1001_ $$aSmith, Richard E.,$$d1952- 000252224 24510 $$aAuthentication :$$bfrom passwords to public keys /$$cRichard E. Smith. 000252224 260__ $$aBoston :$$bAddison-Wesley,$$cc2002. 000252224 300__ $$axx, 549 p. :$$bill. ;$$c24 cm. 000252224 504__ $$aIncludes bibliographical references (p. 471-490) and index. 000252224 650_0 $$aComputer security. 000252224 650_0 $$aAuthentication. 000252224 85200 $$bgen$$hQA76.9.A25$$iS65$$i2002 000252224 909CO $$ooai:library.usi.edu:252224$$pGLOBAL_SET 000252224 980__ $$aBIB 000252224 980__ $$aBOOK 000252224 994__ $$aE0$$bISE