Implementing Biometric Security / Edition 1

Implementing Biometric Security / Edition 1

by John Chirillo, Scott Blaul
     
 

Get the specific guidelines, applications, and procedures for implementing a biometric security system–straight from the experts

As threats to vital data grow ever more complex, maintaining reliable security measures stands at the top of every network administrator’s critical list. In this first-ever book on applied biometrics, renowned expert and Hack

See more details below

Overview

Get the specific guidelines, applications, and procedures for implementing a biometric security system–straight from the experts

As threats to vital data grow ever more complex, maintaining reliable security measures stands at the top of every network administrator’s critical list. In this first-ever book on applied biometrics, renowned expert and Hack Attacks author John Chirillo joins security professional Scott Blaul to deliver the explanations and hands-on examples you need to understand, implement, and apply security authentication methods that rely on fingerprints, retinal scans, speech patterns, even facial thermography. It’s your indispensable guide to setting up and maintaining a biometric security system in a LAN, WAN, or wireless infrastructure.

You’ll learn how to:

  • Assess your situation and determine the most effective form of biometric security to meet your organization’s needs
  • Compare and choose among fingerprint identification, hand geometry, speaker recognition, face location, and retinal scanning
  • Explore and understand the challenges of multibiometrics
  • Comprehend how verification differs from identification and the role biometrics can play in both processes
  • Determine appropriate guidelines and procedures for implementing a biometric security system
  • Understand the overall strengths and weaknesses of various biometric technologies
  • Develop a template for your own practical security applications

The companion Web site provides source code and articles to increase your knowledge of biometrics and help you choose appropriate security methods.

Read More

Product Details

ISBN-13:
9780764525025
Publisher:
Wiley
Publication date:
05/09/2003
Series:
Wiley Red Books Series, #14
Pages:
432
Product dimensions:
9.25(w) x 7.50(h) x 0.89(d)

Table of Contents

Preface.

Acknowledgments.

Chapter 1: Biometrics.

Chapter 2: Fingerprint Technology.

Chapter 3: Face Technology.

Chapter 4: Iris and Retina Vascular Pattern Technology.

Chapter 5: Other Physical Biometrics.

Chapter 6: Signature and Handwriting Technology.

Chapter 7: Voice Recognition.

Chapter 8: Keyboard/Keystroke Dynamics.

Chapter 9: Hiding Data with Passphrases.

Chapter 10: Multibiometrics and Two-Factor Authentication.

Chapter 11: Executive Decision.

Chapter 12: Biometric Solution Case Study.

Appendix A: What’s on the Web Site.

Index.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >