Flylib.com
Part 4: Future and Conclusions
Previous page
Table of content
Next page
< Day Day Up >
Chapter 15. The Future of Biometric Authentication
< Day Day Up >
Previous page
Table of content
Next page
Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)
ISBN: 0131015494
EAN: 2147483647
Year: 2003
Pages: 123
Authors:
Paul Reid
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Key Terms and Concepts
exec s Minions
Using a File as Shared Memory
Summary
C.2. RPC Definitions
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 225 Outside Branch Circuits and Feeders
Article 326 Integrated Gas Spacer Cable Type IGS
Article 360 Flexible Metallic Tubing Type FMT
Article 404: Switches
Annex E. Types of Construction
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 46. Proxy Web Traffic over SSH
Hack 49. Poll Wireless Clients
Hack 68. Set Up an OLSR Mesh Network
Hack 81. Use a Windows-Only Wireless Card in Linux
Hack 98. Align Antennas at Long Distances
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Credibility and Computers
Credibility and the World Wide Web
The Ethics of Persuasive Technology
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Using DMAIC to Improve Speed, Quality, and Cost
Data Collection
Descriptive Statistics and Data Displays
Identifying and Verifying Causes
Complexity Value Stream Mapping and Complexity Analysis
Java Concurrency in Practice
Building Blocks
Extending ThreadPoolExecutor
Performance and Scalability
Reducing Lock Contention
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies