Biometric Technologies and Verification Systems
Biometric Technologies and Verification Systems by Brand: Butterworth-Heinemann at Spring Brook Audio. Hurry! Limited time offer. Offer valid only while supplies last. Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system.
Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
* Contains elements such as Sidebars, Tips, Notes and URL links
* Heavily illustrated with over 150 illustrations, screen captures, and photographs
* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions
|Item Weight:||2.4 pounds|
|Item Size:||1.31 x 9.25 x 9.25 inches|
|Package Weight:||2.3 pounds|
|Package Size:||7.5 x 1.2 x 1.2 inches|
Have questions about this item, or would like to inquire about a custom or bulk order?
If you have any questions about this product by Brand: Butterworth-Heinemann, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.
Related Best Sellers
mpn: 8 black & white illustrations, 18 colour, ean: 9783319147994, isbn: 3319147994,
This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying. The book is divided into two parts. First, an audio watermarking method in discrete wav...
ean: 9780128013281, isbn: 0128013281,
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communica...
By Beigi, Homayoon
mpn: 9780387775913, ean: 9780387775913, isbn: 0387775919,
An emerging technology, Speaker Recognition is becoming well-known for providing voice authentication over the telephone for helpdesks, call centres and other enterprise businesses for business process automation. "Fundamentals of Speaker Recognition...
By Syngress Publishing
ean: 9780128113837, isbn: 0128113839,
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermark...
By Course Technology
ean: 9781435498839, isbn: 1435498836,
Master the skills necessary to launch and complete a successful computer investigation with the updated fourth edition of this popular book, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS. This resource guides readers through conducting a high-tech i...
By Auerbach Publications
ean: 9781439801963, isbn: 9781439801963,
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions o...