November 2018
Intermediate to advanced
556 pages
14h 42m
English
DiD involves the spread of technological barriers, a multi-level approach, and the implementation of mechanisms that detect intrusions.
The most common technological components are the following:
Authentication can occur using techniques linked to biometrics. In this context, Public Key Infrastructure (PKI) can be implemented at the company level to manage the access keys ...