MUALIB
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from Coce
Image from OpenLibrary

Biometrics for network security / Paul Reid.

By: Material type: TextTextSeries: Prentice hall series in computer networking and distributed systemsPublication details: [S.l.] : Prentice Hall PTR, 2003.Edition: illustrated edition edDescription: 288 p. ; 24 cmISBN:
  • 0131015494 (paperback)
  • 9780131015494 (paperback)
DDC classification:
  • 005
Online resources: Summary: The biggest vulnerability in most enterprise networks is the authenticationsystem--especially if it relies solely on passwords. And a result, many companiesare looking to combine password authentication with other authenticationmethods, most especially biometrics. The few biometrics books that do existare overview books aimed at management and/or are not written by biometricspecialists. This book is unique in its coverage of how to design and implementa successful biometric solution for your network--and, it's written by abiometrics expert.Biometrics are automated methods of recognizing a person based on aphysiological or behavioral characteristic. Among the features measured are;face, fingerprints, hand geometry, handwriting, iris, retinal, and voice.Biometric technologies are becoming the foundation of an extensive array ofhighly secure identification and personal verification solutions. As the level ofsecurity breaches and transaction fraud increases, the need for highly secureidentification and personal verification technologies is becoming apparent.
Reviews from LibraryThing.com:
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

The biggest vulnerability in most enterprise networks is the authenticationsystem--especially if it relies solely on passwords. And a result, many companiesare looking to combine password authentication with other authenticationmethods, most especially biometrics. The few biometrics books that do existare overview books aimed at management and/or are not written by biometricspecialists. This book is unique in its coverage of how to design and implementa successful biometric solution for your network--and, it's written by abiometrics expert.Biometrics are automated methods of recognizing a person based on aphysiological or behavioral characteristic. Among the features measured are;face, fingerprints, hand geometry, handwriting, iris, retinal, and voice.Biometric technologies are becoming the foundation of an extensive array ofhighly secure identification and personal verification solutions. As the level ofsecurity breaches and transaction fraud increases, the need for highly secureidentification and personal verification technologies is becoming apparent.

There are no comments on this title.

to post a comment.
Share