Curated by
ACT
These guidelines describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations toFederal agencies and departments for the acquisition and use of technology which supports these methods.
3 Views
0 Downloads