Table of Contents

 <  Day Day Up  >  

   
¢   Table of Contents
 
Biometrics for Network Security
By Paul  Reid
 
Publisher : Prentice Hall PTR
Pub Date : December 30, 2003
ISBN : 0-13-101549-4
Pages : 288
Slots : 1.0    


                   
      Copyright
      Prentice Hall PTR Series in Computer Networking and Distributed Systems
      About Prentice Hall Professional Technical Reference
      Foreword
      Preface
      Acknowledgments
      Part 1:   Introduction and Background
          Chapter 1.   Introduction
        What Makes This Book Different?
        The Structure of This Book
        Everything You Need to Know about Biometrics to Understand the First Three Chapters
        Who Should Read This Book?
        Conclusion
          Chapter 2.   Authentication Technologies
        Something You Know
        Something You Have
        Something You Are
        The Need for Strong Authentication
        The Role of Strong Authentication with Single Sign-On ( SSO )
        Biometric Technologies: An Intelligent Solution
        Conclusion
          Chapter 3.   Protecting Privacy with Biometrics and Policy
        Employer's Right to Privacy
        Employee's Right to Privacy
        Conclusion
      Part 2:   Biometric Technologies
          Chapter 4.   Biometric Technologies
        User Interaction with Biometric Technology
        What Makes a Good Biometric?
        What Makes a Good Biometric for Network Security?
        Conclusion
          Chapter 5.   Finger Biometric Technologies
        General Description of Fingerprints
        How Is the Finger Imaged?
        Types of Algorithms Used for Interpretation
        How Can this Biometric be Spoofed?
        Conclusion
          Chapter 6.   Face Biometric Technologies
        General Description of Face Biometrics
        How Is the Face Imaged?
        What Types of Algorithms Are Used for Facial Interpretation?
        How Can This Biometric Be Spoofed?
        Conclusion
          Chapter 7.   Voice Biometric Technologies
        General Description of Voice Biometrics
        How Is the Voice Captured?
        Types of Algorithms Used for Voice Interpretation
        How Can This Biometric Be Spoofed?
        Conclusion
          Chapter 8.   Iris Biometric Technology
        General Description of Iris Biometrics
        How Is the Iris Captured?
        Description of the Iris Algorithm
        How Can This Biometric Be Spoofed?
        Conclusion
      Part 3:   Implementing Biometrics for Network Security
          Chapter 9.   Recommended Biometric for Network Security
        Finger Biometrics
        Face Biometrics
        Voice Biometrics
        Iris Biometrics
        The Choice of a Biometric for Network Access
        Conclusion
          Chapter 10.   An Introduction to Statistical Measures of Biometrics
        FAR
        FRR
        FTE
        EER
        What Measure Is Most Important?
        Conclusion
          Chapter 11.   The Biometric Transaction
        Securing and Trusting a Biometric Transaction
        Matching Location
        Conclusion
          Chapter 12.   Preparing for the Proof of Concept and Selecting a Vendor
        Define the Driver of the Project as Either Corporate IT or a Business Need
        Define the Business Need or Objectives
        Designate the Internal Sponsor of the Project
        Define the Stakeholders
        Define a Clear Set of Goals and Success Criteria for the Project
        Form and Charter the POC Group
        Based on the Goals and Success Criteria, Invite a Few Vendors to Pilot
        Set the Timelines for the POC and Ensure That the Implementation Activities Are Done Within the Scope of the POC
        Deploy the POC
        Monitor and Evaluate the POC
        Wrap Up the POC
        Decide on the Validity of Each Vendor's Solution
        Make a Go/No Go Decision to Move Ahead
        Announce the Results and Lay the Groundwork for the Next Phase
        Conclusion
          Chapter 13.   Preparing for the Pilot Deployment
        Define the Group of Stakeholders
        Put in Place a Project Management Team That Can See the Solution Through to Rollout
        Form and Charter the Pilot Group
        Develop Policy Documents
        Summarize Daily Reports Weekly and Send Them Out
        Address and Track Problems and Solutions As They Happen
        Put a Training Plan in Place
        Prepare Audit and Analysis Reports
        Build and Test an Automated Install
        Roll Out the Software and Hardware in a Practical Manner
        Provide Mechanisms for Feedback
        After Initial Pilot Rollout, Get the Executives Involved
        Start Addressing Issues of Scalability and Manageability for Rollout
        Near the End of the Pilot, Start Discussing the Next Steps
        Wrap Up the Pilot
        Make a Go/No Go Decision
        Build a Transition Book
        Conclusion
          Chapter 14.   Preparing for the Rollout
        Why Is This Chapter So Short?
        Conclusion
      Part 4:   Future and Conclusions
          Chapter 15.   The Future of Biometric Authentication
        Will Biometrics Be Integrated Everywhere?
        What Other Biometric Measures Will Exist?
        A Futuristic Example: New Form of "Caller ID "
        Conclusion
        Glossary
        Bibliography
 <  Day Day Up  >  


Biometrics for Network Security
Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)
ISBN: 0131015494
EAN: 2147483647
Year: 2003
Pages: 123
Authors: Paul Reid

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net