58,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
29 °P sammeln
  • Broschiertes Buch

Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or…mehr

Produktbeschreibung
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system. Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
Autorenporträt
John R. Vacca is an information technology consultant and writer. The author of twenty-one books and more than 330 articles, his most recent titles include Internet Security, VRML; Bringing Virtual Reality to the Internet, Official Netscape LiveWire Pro Book, and Intranet Security. John was also the configuration management specialist, computer specialist, and the computer security official for NASAs space station program (Freedom) and the Alpha until his early retirement from NASA in 1995.
Rezensionen
"This text would be extremely useful as a ready reference for a seasoned security professional or as a primer for a novice.""The author has struck a fine balance between the details and the big picture, and his book amply lives up to the desired purpose of the book.""Right from this book's introductory lines until the end, Vacca demonstrates his excellent acumen in expressing a complex subject is very accesible prose, making it easy to understand. "Security Management, Col. Kuljeet Singh, CPP