* Biometrics authentication, which relies on fingerprints, speech, or other physical characteristics, is an increasingly important means of protecting critical data
* Gives security professionals specific guidelines, applications, and procedures for implementing a biometric security system in a LAN, WAN, or wireless infrastructure
* Covers fingerprint identification, hand geometry, speaker recognition, face location, retina scanning, and multibiometrics
* Companion Web site contains articles, papers, source code, and product guides
Unter Biometrie versteht man die Messung biologischer Merkmale von Individuen (Sprache, Fingerabdrücke, Irisstruktur und andere). Chirillo und Blaul, erfahrene und anerkannte Fachleute auf dem Gebiet der Sicherheit und Autoren mehrerer einschlägiger Bücher, diskutieren die Biometrie hier erstmals aus dem Blickwinkel der technologischen Umsetzung.
- Biometrie spielt eine Rolle für automatische Authentisierung, zum Beispiel für die Entwicklung von Zugangskennungen für Computernetze
- biometrische Hard- und Software ist ein internationaler Wachstumsmarkt
Reihe
Auflage
Sprache
Verlagsort
Zielgruppe
Illustrationen
Maße
Höhe: 22.9 cm
Breite: 19.1 cm
Dicke: 2.4 cm
Gewicht
ISBN-13
978-0-7645-2502-5 (9780764525025)
Schweitzer Klassifikation
JOHN CHIRILLO is a nationally recognized authority on computer security who has conducted award-winning security audits for Fortune 1000 companies. He is the author of Hack Attacks Revealed, Hack Attacks Denied, Hack Attacks Encyclopedia, and other computer security resources.
SCOTT BLAUL is Director and General Manager of Professional Services at ValCom and a former technical trainer for the US Marine Corps. He has created numerous professional training materials and has extensive experience with storage, SANs, and security vulnerabilities.
Autor*in
ValCom, Itasca, Illinois
ValCom, Carpentersville, Illinois
Preface.
Acknowledgments.
Chapter 1: Biometrics.
Chapter 2: Fingerprint Technology.
Chapter 3: Face Technology.
Chapter 4: Iris and Retina Vascular Pattern Technology.
Chapter 5: Other Physical Biometrics.
Chapter 6: Signature and Handwriting Technology.
Chapter 7: Voice Recognition.
Chapter 8: Keyboard/Keystroke Dynamics.
Chapter 9: Hiding Data with Passphrases.
Chapter 10: Multibiometrics and Two-Factor Authentication.
Chapter 11: Executive Decision.
Chapter 12: Biometric Solution Case Study.
Appendix A: What's on the Web Site.
Index.