Case Study: A Secure Networked Application

  • Keir Davis
  • John W. Turner
  • Nathan Yocom

Abstract

An examination of all the concepts in this section is best supported by a single example that uses those concepts in a real-world context. Let’s look at a networked application that requires the utmost security: an authentication server.

Keywords

Encapsulation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Keir Davis, John W. Turner, Nathan Yocom 2004

Authors and Affiliations

  • Keir Davis
  • John W. Turner
  • Nathan Yocom

There are no affiliations available

Personalised recommendations