Lecture Network security: Chapter 25 - Dr. Munam Ali Shah
Lecture Network security: Chapter 25 - Dr. Munam Ali Shah
This chapter we will continue our discussion on authentication applications and more precisely we will talk about kerberos in detail. kerberos versions, threats and vulnerabilities will also be discussed.