تفاصيل الدورة

The Kerberos protocol relies heavily on an authentication technique that makes use of shared secrets. The basic concept is quite simple: If a secret is known by only two people, either person can verify the identity of the other by confirming that the other person knows the secret.

For example, let's suppose that Alice often sends messages to Bob and that Bob needs to be sure that a message from Alice really has come from Alice before he acts on its information. They decide to solve+ المزيد

دورات يمكنك الالتحاق بها على الفور... خذ دورة عبر الإنترنت على HADOOP ابتداءً من الآن. See all courses