A Guide to understanding identification and authentication in trusted systems.
| Other author | National Computer Security Center (U.S.) |
| Format | Book |
| Publication Info | [Ft. George G. Meade, MD] : National Computer Security Center, [1991] |
| Description | iv, 29 pages : illustrations ; 28 cm. |
| Subjects |
| Series | NCSC-TG ; 017 NCSC-TG 017. ^A367628 |
| General note | Cover title. |
| General note | Shipping list no.: 92-057-P. |
| General note | "September 1991." |
| General note | "Version 1." |
| General note | "Library no. S-235,479"--P. [i]. |
| Bibliography note | Includes bibliographical references (p. 29). |
| Other forms | Also issued online. |
| Issued in other form | Online version: Guide to understanding identification and authentication in trusted systems. [Ft. George G. Meade, MD] : National Computer Security Center, [1991] |
| Technical rpt number | Version 1 |
| Technical rpt number | Library no. S-235,479 |
| GPO item number | 306-A-19 |
| Govt. docs number | D 1.79/4:017/ver.1 |
Availability
| Library | Location | Call Number | Status | Item Actions |
|---|---|---|---|---|
| Joyner | Fed Docs Stacks | D 1.79/4:017/VER.1 | ✔ Available | Place Hold |