* Biometrics authentication, which relies on fingerprints, speech, or other physical characteristics, is an increasingly important means of protecting critical data
* Gives security professionals specific guidelines, applications, and procedures for implementing a biometric security system in a LAN, WAN, or wireless infrastructure
* Covers fingerprint identification, hand geometry, speaker recognition, face location, retina scanning, and multibiometrics
* Companion Web site contains articles, papers, source code, and product guides
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
JOHN CHIRILLO is a nationally recognized authority on computer security who has conducted award-winning security audits for Fortune 1000 companies. He is the author of Hack Attacks Revealed, Hack Attacks Denied, Hack Attacks Encyclopedia, and other computer security resources.
SCOTT BLAUL is Director and General Manager of Professional Services at ValCom and a former technical trainer for the US Marine Corps. He has created numerous professional training materials and has extensive experience with storage, SANs, and security vulnerabilities.
Get the specific guidelines, applications, and procedures for implementing a biometric security system-straight from the experts
As threats to vital data grow ever more complex, maintaining reliable security measures stands at the top of every network administrator's critical list. In this first-ever book on applied biometrics, renowned expert and Hack Attacks author John Chirillo joins security professional Scott Blaul to deliver the explanations and hands-on examples you need to understand, implement, and apply security authentication methods that rely on fingerprints, retinal scans, speech patterns, even facial thermography. It's your indispensable guide to setting up and maintaining a biometric security system in a LAN, WAN, or wireless infrastructure.
You'll learn how to:
* Assess your situation and determine the most effective form of biometric security to meet your organization's needs
* Compare and choose among fingerprint identification, hand geometry, speaker recognition, face location, and retinal scanning
* Explore and understand the challenges of multibiometrics
* Comprehend how verification differs from identification and the role biometrics can play in both processes
* Determine appropriate guidelines and procedures for implementing a biometric security system
* Understand the overall strengths and weaknesses of various biometric technologies
* Develop a template for your own practical security applications
The companion Web site provides source code and articles to increase your knowledge of biometrics and help you choose appropriate security methods.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Very Good. 1s. Former library copy. Pages intact with possible writing/highlighting. Binding strong with minor wear. Dust jackets/supplements may not be included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. Artikel-Nr. 16476661-6
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Paperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Artikel-Nr. G0764525026I3N00
Anzahl: 1 verfügbar
Anbieter: Phatpocket Limited, Waltham Abbey, HERTS, Vereinigtes Königreich
Zustand: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. Artikel-Nr. Z1-S-036-02574
Anzahl: 1 verfügbar