Biometric Technologies and Verification Systems (Paperback)
John R. Vacca
- 出版商: Butterworth-Heineman
- 出版日期: 2007-03-01
- 售價: $2,640
- 貴賓價: 9.5 折 $2,508
- 語言: 英文
- 頁數: 656
- 裝訂: Paperback
- ISBN: 0750679670
- ISBN-13: 9780750679671
立即出貨 (庫存=1)
買這商品的人也買了...
-
$680$537 -
$880$695 -
$650$514 -
$2,310$2,195 -
$650$507 -
$550$468 -
$450$383 -
$600$510 -
$650$507 -
$990LPI Linux Certification in a Nutshell, 2/e (Paperback)
-
$620$558 -
$350$298 -
$990$891 -
$600$480 -
$720$612 -
$680$578 -
$880$748 -
$780$616 -
$520$406 -
$450$356 -
$980$774 -
$590$466 -
$520$442 -
$450$356 -
$590$502
相關主題
商品描述
Description:
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system.
Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
Table of Contents:
Part 1: Overview Of Biometrics Technology And Verification Systems
CHAPTER 1: What Is Biometrics?
CHAPTER 2: Types Of Biometrics Technology And Verification Systems
CHAPTER 3: Biometrics Technology And Verification Systems Standards
Part 2: How Biometrics Eye Analysis Technology Works
CHAPTER 4: How Iris Pattern Recognition Works
CHAPTER 5: How Retina Pattern Recognition Works
Part 3: How Biometrics Facial Recognition Technology Works
CHAPTER 6: How Video Face Recognition Works
CHAPTER 7: How Facial Thermal Imaging In The Infrared Spectrum Works
Part 4: How Biometrics Finger Scanning Analysis Technology Works
CHAPTER 8: How Finger Image Capture Works
CHAPTER 9: How Fingerscanning Verification And Recognition Works
Part 5: How Biometrics Geometry Analysis Technology Works
CHAPTER 10: How Hand Geometry Image Technology Works
CHAPTER 11: How Finger Geometry Technology Works
Part 6: How Biometrics Verification Technology Works
CHAPTER 12: How Dynamic Signature Verification Technology Works
CHAPTER 13: How Voice Recognition Technology Works
CHAPTER 14: How Keystroke Dynamics Technology Works
CHAPTER 15: How Palm Print Pattern Recognition Technology Works
CHAPTER 16: How Vein Pattern Analysis Recognition Technology Works
CHAPTER 17: How Ear Shape Analysis Technology Works
CHAPTER 18: How Body Odor And/Or Scent Analysis And Other Advanced Technology Works
CHAPTER 19: How DNA Measurement Technology Works
Part 7: How Privacy Enhanced Biometrics Based Verification/Authentication Works
CHAPTER 20: How Fingerprint Verification/Authentication Technology Works
CHAPTER 21: Vulnerable Points Of A Biometric Verification System
CHAPTER 22: How Brute Force Attacks Work
CHAPTER 23: How Data Hiding Technology Works
CHAPTER 24: Image-Based Challenges/Response Methods
CHAPTER 25: How Cancelable Biometrics Work
Part 8: Large-Scale Implementation/Deployment Of Biometrics Technologies And Verification Systems
CHAPTER 26: Specialized Biometrics Enterprise Deployment
CHAPTER 27: How to Implement Biometrics Technology And Verification Systems
Part 9: Biometrics Solutions And Future Directions
CHAPTER 28: How Mapping The Body Technology Works
CHAPTER 29: Selecting Biometric Solutions
CHAPTER 30: Biometric Benefits