Verification of User Identity in Computer Systems – different biometrics recognition technologies were reviewed in Part1. In this video the focus is on password methods. This video is presented by Prof. Lubomir Bic