Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Biometrics for Network Security Table of Contents Copyright Prentice Hall PTR Series in Computer Networking and Distributed Systems About Prentice Hall Professional Technical Reference Foreword Preface Acknowledgments Part 1: Introduction and Background
Chapter 1. Introduction
What Makes This Book Different? The Structure of This Book Everything You Need to Know about Biometrics to Understand the First Three Chapters Who Should Read This Book? Conclusion
Chapter 2. Authentication Technologies
Something You Know Something You Have Something You Are The Need for Strong Authentication The Role of Strong Authentication with Single Sign-On (SSO) Biometric Technologies: An Intelligent Solution Conclusion
Chapter 3. Protecting Privacy with Biometrics and Policy
Employer's Right to Privacy Employee's Right to Privacy Conclusion
Part 2: Biometric Technologies
Chapter 4. Biometric Technologies
User Interaction with Biometric Technology What Makes a Good Biometric? What Makes a Good Biometric for Network Security? Conclusion
Chapter 5. Finger Biometric Technologies
General Description of Fingerprints How Is the Finger Imaged? Types of Algorithms Used for Interpretation How Can this Biometric be Spoofed? Conclusion
Chapter 6. Face Biometric Technologies
General Description of Face Biometrics How Is the Face Imaged? What Types of Algorithms Are Used for Facial Interpretation? How Can This Biometric Be Spoofed?[2] Conclusion
Chapter 7. Voice Biometric Technologies
General Description of Voice Biometrics How Is the Voice Captured? Types of Algorithms Used for Voice Interpretation How Can This Biometric Be Spoofed? Conclusion
Chapter 8. Iris Biometric Technology[1]
General Description of Iris Biometrics How Is the Iris Captured? Description of the Iris Algorithm How Can This Biometric Be Spoofed? Conclusion
Part 3: Implementing Biometrics for Network Security
Chapter 9. Recommended Biometric for Network Security
Finger Biometrics Face Biometrics Voice Biometrics Iris Biometrics The Choice of a Biometric for Network Access Conclusion
Chapter 10. An Introduction to Statistical Measures of Biometrics
FAR FRR FTE EER What Measure Is Most Important? Conclusion
Chapter 11. The Biometric Transaction
Securing and Trusting a Biometric Transaction Matching Location Conclusion
Chapter 12. Preparing for the Proof of Concept and Selecting a Vendor
Define the Driver of the Project as Either Corporate IT or a Business Need Define the Business Need or Objectives Designate the Internal Sponsor of the Project Define the Stakeholders Define a Clear Set of Goals and Success Criteria for the Project Form and Charter the POC Group Based on the Goals and Success Criteria, Invite a Few Vendors to Pilot Set the Timelines for the POC and Ensure That the Implementation Activities Are Done Within the Scope of the POC Deploy the POC Monitor and Evaluate the POC Wrap Up the POC Decide on the Validity of Each Vendor's Solution Make a Go/No Go Decision to Move Ahead Announce the Results and Lay the Groundwork for the Next Phase Conclusion
Chapter 13. Preparing for the Pilot Deployment
Define the Group of Stakeholders Put in Place a Project Management Team That Can See the Solution Through to Rollout Form and Charter the Pilot Group Develop Policy Documents Summarize Daily Reports Weekly and Send Them Out Address and Track Problems and Solutions As They Happen Put a Training Plan in Place Prepare Audit and Analysis Reports Build and Test an Automated Install Roll Out the Software and Hardware in a Practical Manner Provide Mechanisms for Feedback After Initial Pilot Rollout, Get the Executives Involved Start Addressing Issues of Scalability and Manageability for Rollout Near the End of the Pilot, Start Discussing the Next Steps Wrap Up the Pilot Make a Go/No Go Decision Build a Transition Book Conclusion
Chapter 14. Preparing for the Rollout
Why Is This Chapter So Short? Conclusion
Part 4: Future and Conclusions
Chapter 15. The Future of Biometric Authentication
Will Biometrics Be Integrated Everywhere? What Other Biometric Measures Will Exist? A Futuristic Example: New Form of Conclusion
Glossary Bibliography
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion