HP Open Source Security for OpenVMS Volume 3: Kerberos > PrefaceIntended Audience
This document is for application developers who want to implement the Kerberos protocol that uses strong cryptography, so that a client can prove its identity to a server (and vice versa) across an insecure network connection. |