?

Client/server architecture may potentially involve a variety of hardware, systems software, and application software from many vendors. The best way to protect a client/ server system from unauthorized access is through