This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Guy R. Martino, “Secure or Vulnerable? Your Identity is the Key,” © 2002–2004 Biometric Technology Solutions, LLC, All rights reserved. Biometric Technology Solutions, LLC, 2005.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Impersonating Users. In: Practical Internet Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-29844-3_11
Download citation
DOI: https://doi.org/10.1007/978-0-387-29844-3_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-40533-9
Online ISBN: 978-0-387-29844-3
eBook Packages: Computer ScienceComputer Science (R0)
