Implementing Biometric Security - Softcover

Chirillo, John

 
9780764525025: Implementing Biometric Security

Inhaltsangabe

* Biometrics authentication, which relies on fingerprints, speech, or other physical characteristics, is an increasingly important means of protecting critical data
* Gives security professionals specific guidelines, applications, and procedures for implementing a biometric security system in a LAN, WAN, or wireless infrastructure
* Covers fingerprint identification, hand geometry, speaker recognition, face location, retina scanning, and multibiometrics
* Companion Web site contains articles, papers, source code, and product guides

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.

Über die Autorin bzw. den Autor

JOHN CHIRILLO is a nationally recognized authority on computer security who has conducted award-winning security audits for Fortune 1000 companies. He is the author of Hack Attacks Revealed, Hack Attacks Denied, Hack Attacks Encyclopedia, and other computer security resources.
 
SCOTT BLAUL is Director and General Manager of Professional Services at ValCom and a former technical trainer for the US Marine Corps. He has created numerous professional training materials and has extensive experience with storage, SANs, and security vulnerabilities.

Von der hinteren Coverseite

Get the specific guidelines, applications, and procedures for implementing a biometric security system-straight from the experts
 
As threats to vital data grow ever more complex, maintaining reliable security measures stands at the top of every network administrator's critical list. In this first-ever book on applied biometrics, renowned expert and Hack Attacks author John Chirillo joins security professional Scott Blaul to deliver the explanations and hands-on examples you need to understand, implement, and apply security authentication methods that rely on fingerprints, retinal scans, speech patterns, even facial thermography. It's your indispensable guide to setting up and maintaining a biometric security system in a LAN, WAN, or wireless infrastructure.
 
You'll learn how to:
* Assess your situation and determine the most effective form of biometric security to meet your organization's needs
* Compare and choose among fingerprint identification, hand geometry, speaker recognition, face location, and retinal scanning
* Explore and understand the challenges of multibiometrics
* Comprehend how verification differs from identification and the role biometrics can play in both processes
* Determine appropriate guidelines and procedures for implementing a biometric security system
* Understand the overall strengths and weaknesses of various biometric technologies
* Develop a template for your own practical security applications
 
The companion Web site provides source code and articles to increase your knowledge of biometrics and help you choose appropriate security methods.

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.