Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate. Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evol
Biometrics for Network Security
β Scribed by Paul Reid
- Publisher
- Prentice Hall PTR
- Year
- 2003
- Tongue
- English
- Leaves
- 288
- Series
- Prentice Hall Series in Computer Networking and Distributed
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The biggest vulnerability in most enterprise networks is the authenticationsystem--especially if it relies solely on passwords. And a result, many companiesare looking to combine password authentication with other authenticationmethods, most especially biometrics. The few biometrics books that do existare overview books aimed at management and/or are not written by biometricspecialists. This book is unique in its coverage of how to design and implementa successful biometric solution for your network--and, it's written by abiometrics expert.Biometrics are automated methods of recognizing a person based on aphysiological or behavioral characteristic. Among the features measured are;face, fingerprints, hand geometry, handwriting, iris, retinal, and voice.Biometric technologies are becoming the foundation of an extensive array ofhighly secure identification and personal verification solutions. As the level ofsecurity breaches and transaction fraud increases, the need for highly secureidentification and personal verification technologies is becoming apparent.
π SIMILAR VOLUMES
"The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one
<p><p></p><p>This book explores intrinsic and human body part biometrics and biometrics of human physiological activities, invisible to the naked eye. This includes, for instance, brain structures, skeleton morphology, heart activity, etc. These human body parts can only be visualized using specific
<p>This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on th
<p><P>Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems, as their primary means of connecting to the world around them.</P><P>Given the significant focus