𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Biometrics for Network Security

✍ Scribed by Paul Reid


Publisher
Prentice Hall PTR
Year
2003
Tongue
English
Leaves
288
Series
Prentice Hall Series in Computer Networking and Distributed
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The biggest vulnerability in most enterprise networks is the authenticationsystem--especially if it relies solely on passwords. And a result, many companiesare looking to combine password authentication with other authenticationmethods, most especially biometrics. The few biometrics books that do existare overview books aimed at management and/or are not written by biometricspecialists. This book is unique in its coverage of how to design and implementa successful biometric solution for your network--and, it's written by abiometrics expert.Biometrics are automated methods of recognizing a person based on aphysiological or behavioral characteristic. Among the features measured are;face, fingerprints, hand geometry, handwriting, iris, retinal, and voice.Biometric technologies are becoming the foundation of an extensive array ofhighly secure identification and personal verification solutions. As the level ofsecurity breaches and transaction fraud increases, the need for highly secureidentification and personal verification technologies is becoming apparent.


πŸ“œ SIMILAR VOLUMES


Biometrics for Network Security
✍ Paul Reid πŸ“‚ Library πŸ“… 2003 πŸ› Prentice Hall PTR 🌐 English

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate. Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evol

Iris biometric model for secured network
✍ Franjieh El Khoury πŸ“‚ Library πŸ“… 2013 πŸ› CRC Press 🌐 English

"The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one

Hidden Biometrics: When Biometric Securi
✍ Amine Nait-ali πŸ“‚ Library πŸ“… 2020 πŸ› Springer Singapore 🌐 English

<p><p></p><p>This book explores intrinsic and human body part biometrics and biometrics of human physiological activities, invisible to the naked eye. This includes, for instance, brain structures, skeleton morphology, heart activity, etc. These human body parts can only be visualized using specific

Mobile Networks for Biometric Data Analy
✍ Massimo Conti, Natividad MartΓ­nez Madrid, Ralf Seepold, Simone Orcioni (eds.) πŸ“‚ Library πŸ“… 2016 πŸ› Springer International Publishing 🌐 English

<p>This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on th

Security for Telecommunications Networks
✍ Patrick Traynor, Patrick McDaniel, Thomas La Porta (auth.) πŸ“‚ Library πŸ“… 2008 πŸ› Springer US 🌐 English

<p><P>Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems, as their primary means of connecting to the world around them.</P><P>Given the significant focus