Implementing Biometric Security - John Chirillo, Scott Blaul

Implementing Biometric Security

Buch | Softcover
432 Seiten
2003
John Wiley & Sons Inc (Verlag)
978-0-7645-2502-5 (ISBN)
58,42 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
In computer security, biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. Examples include computer analysis of fingerprints or speech or a computer requiring fingerprint verification for logon approval.
Biometrics authentication, which relies on fingerprints, speech, or other physical characteristics, is an increasingly important means of protecting critical data Gives security professionals specific guidelines, applications, and procedures for implementing a biometric security system in a LAN, WAN, or wireless infrastructure Covers fingerprint identification, hand geometry, speaker recognition, face location, retina scanning, and multibiometrics Companion Web site contains articles, papers, source code, and product guides

JOHN CHIRILLO is a nationally recognized authority on computer security who has conducted award-winning security audits for Fortune 1000 companies. He is the author of Hack Attacks Revealed, Hack Attacks Denied, Hack Attacks Encyclopedia, and other computer security resources. SCOTT BLAUL is Director and General Manager of Professional Services at ValCom and a former technical trainer for the US Marine Corps. He has created numerous professional training materials and has extensive experience with storage, SANs, and security vulnerabilities.

Preface. Acknowledgments. Chapter 1: Biometrics. Chapter 2: Fingerprint Technology. Chapter 3: Face Technology. Chapter 4: Iris and Retina Vascular Pattern Technology. Chapter 5: Other Physical Biometrics. Chapter 6: Signature and Handwriting Technology. Chapter 7: Voice Recognition. Chapter 8: Keyboard/Keystroke Dynamics. Chapter 9: Hiding Data with Passphrases. Chapter 10: Multibiometrics and Two-Factor Authentication. Chapter 11: Executive Decision. Chapter 12: Biometric Solution Case Study. Appendix A: What's on the Web Site. Index.

Erscheint lt. Verlag 9.5.2003
Reihe/Serie Wiley Red Books
Zusatzinfo Illustrations
Verlagsort New York
Sprache englisch
Maße 190 x 235 mm
Gewicht 774 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-7645-2502-6 / 0764525026
ISBN-13 978-0-7645-2502-5 / 9780764525025
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00