- Shopping Bag ( 0 items )
From Barnes & NobleThe Barnes & Noble Review
Traditionally, most security systems authenticate you based on something you know -- i.e., a password. However, where security really matters, it makes sense to add a second layer. That could be something you have (e.g., a smartcard). Or, it could be something you are -- something that, at least theoretically, would be virtually impossible to forge. Your fingerprint or handprint. Your face. The characteristics of your iris or retina. Your DNA. Your voice. Your signature. The rhythm of your typing.
These “biometric” systems are now viable for a wide range of security applications and environments. But relatively few business and security professionals really understand biometrics. Implementing Biometric Security takes on the questions every potential biometrics implementer needs to answer.
What’s involved in installing, configuring, using, and managing each type of system? What support staff will you need? Which technologies are most reliable? What’s the right approach for each application -- or for multiple applications?
If you’re securing digital assets, which tools make sense for logon access, or for secure access to email and encrypted files? Should you implement PKI or security portals alongside biometrics, and how do they integrate? How do you serve users that present themselves via LAN, Web, wireless, VPN?
The authors cover applications ranging from airport security and ATMs to medical record access and time and attendance tracking -- even home security. Simply put, this is biometrics demystified -- so you can make intelligent decisions about it. Bill Camarda
Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks for Dummies, Second Edition.