Witten
Bainbridge
Nichols
HOME HELP PREFERENCES SEARCHFIGURESTABLES
close this section of the library Chapter 11: Operating and interoperating
close this section of the library Figure 11.3: Authentication lines from a collection configuration file
View the document Figure 11.3: Authentication lines from a collection configuration file