MUALIB

Biometrics for network security / (Record no. 4180)

MARC details
000 -LEADER
fixed length control field 01837nam a2200217 a 4500
001 - CONTROL NUMBER
control field ASIN0131015494
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20110112023156.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110112s2003 xxu eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0131015494 (paperback)
Terms of availability $44.99
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780131015494 (paperback)
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Reid, Paul.
245 10 - TITLE STATEMENT
Title Biometrics for network security /
Statement of responsibility, etc Paul Reid.
250 ## - EDITION STATEMENT
Edition statement illustrated edition ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc [S.l.] :
Name of publisher, distributor, etc Prentice Hall PTR,
Date of publication, distribution, etc 2003.
300 ## - PHYSICAL DESCRIPTION
Extent 288 p. ;
Dimensions 24 cm.
490 1# - SERIES STATEMENT
Series statement Prentice hall series in computer networking and distributed systems.
520 ## - SUMMARY, ETC.
Summary, etc The biggest vulnerability in most enterprise networks is the authenticationsystem--especially if it relies solely on passwords. And a result, many companiesare looking to combine password authentication with other authenticationmethods, most especially biometrics. The few biometrics books that do existare overview books aimed at management and/or are not written by biometricspecialists. This book is unique in its coverage of how to design and implementa successful biometric solution for your network--and, it's written by abiometrics expert.Biometrics are automated methods of recognizing a person based on aphysiological or behavioral characteristic. Among the features measured are;face, fingerprints, hand geometry, handwriting, iris, retinal, and voice.Biometric technologies are becoming the foundation of an extensive array ofhighly secure identification and personal verification solutions. As the level ofsecurity breaches and transaction fraud increases, the need for highly secureidentification and personal verification technologies is becoming apparent.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Prentice hall series in computer networking and distributed systems.
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Amazon.com
Uniform Resource Identifier <a href="http://www.amazon.com/exec/obidos/ASIN/0131015494/chopaconline-20">http://www.amazon.com/exec/obidos/ASIN/0131015494/chopaconline-20</a>

No items available.