Curated by
ACT
These guidelines describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations toFederal agencies and departments for the acquisition and use of technology which supports these methods.
3 Views
0 Downloads
Start Your Free Trial
Save time and discover engaging curriculum for your classroom. Reviewed and rated by trusted, credentialed teachers.