The author discusses protecting data by denying direct physical access onto a user's computer; that is, protect sensitive data terminals from being used by unauthorized users. The emphasis is on how to identify users - to make sure that they are who they claim to be, to a certain level of certainty...