HP Open Source Security for OpenVMS Volume 3: Kerberos > Preface

Intended Audience

  Table of Contents

  Glossary

  Index

This document is for application developers who want to implement the Kerberos protocol that uses strong cryptography, so that a client can prove its identity to a server (and vice versa) across an insecure network connection.