This volume examines techniques for contemporary authentication methods for computer access control and security passwords, and also looks at how to choose the best authentication method for any given... This description may be from another edition of this product.