Information security education in the UK: a proposed course in secure e-commerce systems
Proceedings of the 1st annual conference on Information security curriculum development
What do we know about biometrics authentication?
Proceedings of the 4th annual conference on Information security curriculum development
A distributed speaker authentication system
ACC'08 Proceedings of the WSEAS International Conference on Applied Computing Conference
Speaker recognition techniques for remote authentication of users in computer networks
WSEAS TRANSACTIONS on SYSTEMS
Facial recognition in uncontrolled conditions for information security
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
Laser Doppler vibrometry measures of physiological function: evaluation of biometric capabilities
IEEE Transactions on Information Forensics and Security
Journal of Systems and Software
Artificial finger detection by spectrum analysis
International Journal of Biometrics
A method for footprint range image segmentation and description
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Hi-index | 0.00 |
From the Publisher:Get the specific guidelines, applications, and procedures for implementing a biometric security systemstraight from the expertsAs threats to vital data grow ever more complex, maintaining reliable security measures stands at the top of every network administrators critical list. In this first-ever book on applied biometrics, renowned expert and Hack Attacks author John Chirillo joins security professional Scott Blaul to deliver the explanations and hands-on examples you need to understand, implement, and apply security authentication methods that rely on fingerprints, retinal scans, speech patterns, even facial thermography. Its your indispensable guide to setting up and maintaining a biometric security system in a LAN, WAN, or wireless infrastructure. Youll learn how to: Assess your situation and determine the most effective form of biometric security to meet your organizations needs Compare and choose among fingerprint identification, hand geometry, speaker recognition, face location, and retinal scanning Explore and understand the challenges of multibiometrics Comprehend how verification differs from identification and the role biometrics can play in both processes Determine appropriate guidelines and procedures for implementing a biometric security system Understand the overall strengths and weaknesses of various biometric technologies Develop a template for your own practical security applications The companion Web site provides source code and articles to increase your knowledge of biometrics and help you choose appropriate security methods. About the Authors:JOHN CHIRILLO is a nationally recognized authority on computer security who has conducted award-winning security audits for Fortune 1000 companies. He is the author of Hack Attacks Revealed, Hack Attacks Denied, Hack Attacks Encyclopedia, and other computer security resources. SCOTT BLAUL is Director and General Manager of Professional Services at ValCom and a former technical trainer for the US Marine Corps. He has created numerous professional training materials and has extensive experience with storage, SANs, and security vulnerabilities.