Biometric Technologies and Verification Systems
Autor John R. Vaccaen Limba Engleză Paperback – 22 apr 2007
* Contains elements such as Sidebars, Tips, Notes and URL links* Heavily illustrated with over 150 illustrations, screen captures, and photographs* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions
Preț: 360.52 lei
Preț vechi: 455.43 lei
-21% Nou
Puncte Express: 541
Preț estimativ în valută:
68.99€ • 71.88$ • 57.37£
68.99€ • 71.88$ • 57.37£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780750679671
ISBN-10: 0750679670
Pagini: 656
Ilustrații: Approx. 160 illustrations
Dimensiuni: 191 x 235 x 24 mm
Greutate: 1.09 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0750679670
Pagini: 656
Ilustrații: Approx. 160 illustrations
Dimensiuni: 191 x 235 x 24 mm
Greutate: 1.09 kg
Editura: ELSEVIER SCIENCE
Public țintă
CSO Security Managers, IT/computer security professionals, security consultants and IT and physical electronic security Ssystem designers. Security engineering designers, bioinformatics engineers, biometric developers, DoD and the various national research labs, various arms of DHS.Cuprins
Part 1: Overview Of Biometrics Technology And Verification SystemsCHAPTER 1: What Is Biometrics?CHAPTER 2: Types Of Biometrics Technology And Verification SystemsCHAPTER 3: Biometrics Technology And Verification Systems StandardsPart 2: How Biometrics Eye Analysis Technology WorksCHAPTER 4: How Iris Pattern Recognition WorksCHAPTER 5: How Retina Pattern Recognition WorksPart 3: How Biometrics Facial Recognition Technology WorksCHAPTER 6: How Video Face Recognition WorksCHAPTER 7: How Facial Thermal Imaging In The Infrared Spectrum WorksPart 4: How Biometrics Finger Scanning Analysis Technology WorksCHAPTER 8: How Finger Image Capture WorksCHAPTER 9: How Fingerscanning Verification And Recognition WorksPart 5: How Biometrics Geometry Analysis Technology WorksCHAPTER 10: How Hand Geometry Image Technology WorksCHAPTER 11: How Finger Geometry Technology WorksPart 6: How Biometrics Verification Technology WorksCHAPTER 12: How Dynamic Signature Verification Technology WorksCHAPTER 13: How Voice Recognition Technology WorksCHAPTER 14: How Keystroke Dynamics Technology WorksCHAPTER 15: How Palm Print Pattern Recognition Technology WorksCHAPTER 16: How Vein Pattern Analysis Recognition Technology WorksCHAPTER 17: How Ear Shape Analysis Technology Works CHAPTER 18: How Body Odor And/Or Scent Analysis And Other Advanced Technology WorksCHAPTER 19: How DNA Measurement Technology WorksPart 7: How Privacy Enhanced Biometrics Based Verification/Authentication WorksCHAPTER 20: How Fingerprint Verification/Authentication Technology WorksCHAPTER 21: Vulnerable Points Of A Biometric Verification SystemCHAPTER 22: How Brute Force Attacks WorkCHAPTER 23: How Data Hiding Technology WorksCHAPTER 24: Image-Based Challenges/Response MethodsCHAPTER 25: How Cancelable Biometrics WorkPart 8: Large-Scale Implementation/Deployment Of Biometrics Technologies And Verification SystemsCHAPTER 26: Specialized Biometrics Enterprise DeploymentCHAPTER 27: How to Implement Biometrics Technology And Verification SystemsPart 9: Biometrics Solutions And Future DirectionsCHAPTER 28: How Mapping The Body Technology WorksCHAPTER 29: Selecting Biometric SolutionsCHAPTER 30: Biometric Benefits
Recenzii
"This text would be extremely useful as a ready reference for a seasoned security professional or as a primer for a novice.""The author has struck a fine balance between the details and the big picture, and his book amply lives up to the desired purpose of the book.""Right from this book's introductory lines until the end, Vacca demonstrates his excellent acumen in expressing a complex subject is very accesible prose, making it easy to understand. "Security Management, Col. Kuljeet Singh, CPP