The biggest vulnerability in most enterprise networks is the authenticationsystem--especially if it relies solely on passwords. And a result, many companiesare looking to combine password authentication with other authenticationmethods, most especially biometrics. The few biometrics books that do ex
Biometrics for Network Security
β Scribed by Paul Reid
- Publisher
- Prentice Hall PTR
- Year
- 2003
- Tongue
- English
- Leaves
- 288
- Series
- Prentice Hall Series in Computer Networking and Distributed Systems
- Edition
- illustrated edition
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate. Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application.In Biometrics for Network Security, biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems. Coverage includes:An introduction to authentication technologies and biometrics Dealing with privacy issues Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face Security concerns related to biometrics, including attempts to spoof or fake results Deployment of biometric security systems, including vendor selection and roll out procedures Real-life case studies For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!"
π SIMILAR VOLUMES
"The rapid evolution of technology in the computer world has made securing access to confidential data a very important issue in terms of research. This technology is likely to evolve in various architectures. Each architecture has its own functionality, its advantages and disadvantages. On the one
<p><p></p><p>This book explores intrinsic and human body part biometrics and biometrics of human physiological activities, invisible to the naked eye. This includes, for instance, brain structures, skeleton morphology, heart activity, etc. These human body parts can only be visualized using specific
<p>This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on th
<p><P>Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems, as their primary means of connecting to the world around them.</P><P>Given the significant focus