Biometrics (eBook)
320 Seiten
John Wiley & Sons (Verlag)
978-0-471-26478-1 (ISBN)
successful deployment
Biometrics technologies verify identity through characteristics
such as fingerprints, voices, and faces. By providing increased
security and convenience, biometrics have begun to see widespread
deployment in network, e-commerce, and retail applications. This
book provides in-depth analysis of biometrics as a solution for
authenticating employees and customers. Leading authority, Samir
Nanavati explores privacy, security, accuracy, system design, user
perceptions, and lessons learned in biometric deployments. He also
assesses the real-world strengths and weaknesses of leading
biometric technologies: finger-scan, iris-scan, facial-scan,
voice-scan, and signature-scan. This accessible book is a necessary
step in understanding and implementing biometrics.
Demystifies the complex world of optical networks for IT and
business managers
Over the past few years, the cost of fiber optic networking has
decreased, making it the best solution for providing virtually
unlimited bandwidth for corporate LANs and WANs, metropolitan
networks, Internet access, and broadband to the home. The only
strategic book on optical networking technologies written from a
real-world business perspective, Optical Networking demystifies
complex fiber technologies for managers, and details the practical
business benefits an optical network can offer. Debra Cameron
explores established and emerging markets for optical networks as
well as the enabling technologies, applications, network
architectures, key deployment issues, and cost considerations. She
also provides in-depth case studies of optical networks now in use
in the United States and abroad.
SAMIR NANAVATI is a founding partner of International Biometric Group, LLC, a biometric consulting and integration firm cofounded in 1996. Mr. Nanavati is cited frequently by several leading publications such as U.S. News & World Report, the New York Times, and The Industry Standard. He is also the author of fourteen analyses on the state of the biometric industry. MICHAEL THIEME is a Senior Consultant with International Biometric Group. He has written extensively on a variety of biometric topics including IT security, deployment issues, and privacy. Mr. Thieme served on the Biometric Interoperability Subcommittee of the GSA Smart Access project and is also a member of the ANSI NIST B10.8 Biometric Subcommittee as well as a founder of the BioPrivacy Initiative. RAJ NANAVATI is a cofounding partner at International Biometric Group, LLC. He lectures extensively on the technical, business, and policy issues associated with using biometrics. He has been quoted extensively in major media publications, including the New York Times, and has been featured on National Public Radio. He has also submitted testimony on biometrics to Congress.
Introduction.
Acknowledgments.
PART 1: BIOMETRIC FUNDAMENTALS.
Why Biometrics?
Key Biometric Terms and Processes.
Accuracy in Biometric Systems.
PART 2: LEADING BIOMETRIC TECHNOLOGIES: WHAT YOU NEED TO KNOW.
Finger-Scan.
Facial-Scan.
Iris-Scan.
Voice-Scan.
Other Physiological Biometrics.
Other Leading Behavioral Biometrics.
PART 3: BIOMETRIC APPLICATIONS AND MARKETS.
Categorizing Biometric Applications.
Citizen-Facing Applications.
Employee-Facing Applications.
Customer-Facing Applications.
Biometric Vertical Markets.
PART 4: PRIVACY AND STANDARDS IN BIOMETRIC SYSTEM DESIGN.
Assessing the Privacy Risks of Biometrics.
Designing Privacy-Sympathetic Biometric Systems.
Biometric Standards.
Index.
"...particularly relevant...questions are raised and useful answers given...the material is extensive...substantial and well-researched material..."
(Computer Bulletin, May 2003)
Erscheint lt. Verlag | 29.4.2002 |
---|---|
Reihe/Serie | Wiley Tech Brief Series | Wiley Tech Brief Series |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Technik ► Elektrotechnik / Energietechnik | |
Schlagworte | Biometrie • Computer Science • Informatik • Networking / Security • Netzwerke / Sicherheit |
ISBN-10 | 0-471-26478-4 / 0471264784 |
ISBN-13 | 978-0-471-26478-1 / 9780471264781 |
Haben Sie eine Frage zum Produkt? |
Größe: 2,4 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich