| | Copyright |
| | Prentice Hall PTR Series in Computer Networking and Distributed Systems |
| | About Prentice Hall Professional Technical Reference |
| | Foreword |
| | Preface |
| | Acknowledgments |
| | Part 1: Introduction and Background |
| | | Chapter 1. Introduction |
| | | What Makes This Book Different? |
| | | The Structure of This Book |
| | | Everything You Need to Know about Biometrics to Understand the First Three Chapters |
| | | Who Should Read This Book? |
| | | Conclusion |
| | | Chapter 2. Authentication Technologies |
| | | Something You Know |
| | | Something You Have |
| | | Something You Are |
| | | The Need for Strong Authentication |
| | | The Role of Strong Authentication with Single Sign-On ( SSO ) |
| | | Biometric Technologies: An Intelligent Solution |
| | | Conclusion |
| | | Chapter 3. Protecting Privacy with Biometrics and Policy |
| | | Employer's Right to Privacy |
| | | Employee's Right to Privacy |
| | | Conclusion |
| | Part 2: Biometric Technologies |
| | | Chapter 4. Biometric Technologies |
| | | User Interaction with Biometric Technology |
| | | What Makes a Good Biometric? |
| | | What Makes a Good Biometric for Network Security? |
| | | Conclusion |
| | | Chapter 5. Finger Biometric Technologies |
| | | General Description of Fingerprints |
| | | How Is the Finger Imaged? |
| | | Types of Algorithms Used for Interpretation |
| | | How Can this Biometric be Spoofed? |
| | | Conclusion |
| | | Chapter 6. Face Biometric Technologies |
| | | General Description of Face Biometrics |
| | | How Is the Face Imaged? |
| | | What Types of Algorithms Are Used for Facial Interpretation? |
| | | How Can This Biometric Be Spoofed? |
| | | Conclusion |
| | | Chapter 7. Voice Biometric Technologies |
| | | General Description of Voice Biometrics |
| | | How Is the Voice Captured? |
| | | Types of Algorithms Used for Voice Interpretation |
| | | How Can This Biometric Be Spoofed? |
| | | Conclusion |
| | | Chapter 8. Iris Biometric Technology |
| | | General Description of Iris Biometrics |
| | | How Is the Iris Captured? |
| | | Description of the Iris Algorithm |
| | | How Can This Biometric Be Spoofed? |
| | | Conclusion |
| | Part 3: Implementing Biometrics for Network Security |
| | | Chapter 9. Recommended Biometric for Network Security |
| | | Finger Biometrics |
| | | Face Biometrics |
| | | Voice Biometrics |
| | | Iris Biometrics |
| | | The Choice of a Biometric for Network Access |
| | | Conclusion |
| | | Chapter 10. An Introduction to Statistical Measures of Biometrics |
| | | FAR |
| | | FRR |
| | | FTE |
| | | EER |
| | | What Measure Is Most Important? |
| | | Conclusion |
| | | Chapter 11. The Biometric Transaction |
| | | Securing and Trusting a Biometric Transaction |
| | | Matching Location |
| | | Conclusion |
| | | Chapter 12. Preparing for the Proof of Concept and Selecting a Vendor |
| | | Define the Driver of the Project as Either Corporate IT or a Business Need |
| | | Define the Business Need or Objectives |
| | | Designate the Internal Sponsor of the Project |
| | | Define the Stakeholders |
| | | Define a Clear Set of Goals and Success Criteria for the Project |
| | | Form and Charter the POC Group |
| | | Based on the Goals and Success Criteria, Invite a Few Vendors to Pilot |
| | | Set the Timelines for the POC and Ensure That the Implementation Activities Are Done Within the Scope of the POC |
| | | Deploy the POC |
| | | Monitor and Evaluate the POC |
| | | Wrap Up the POC |
| | | Decide on the Validity of Each Vendor's Solution |
| | | Make a Go/No Go Decision to Move Ahead |
| | | Announce the Results and Lay the Groundwork for the Next Phase |
| | | Conclusion |
| | | Chapter 13. Preparing for the Pilot Deployment |
| | | Define the Group of Stakeholders |
| | | Put in Place a Project Management Team That Can See the Solution Through to Rollout |
| | | Form and Charter the Pilot Group |
| | | Develop Policy Documents |
| | | Summarize Daily Reports Weekly and Send Them Out |
| | | Address and Track Problems and Solutions As They Happen |
| | | Put a Training Plan in Place |
| | | Prepare Audit and Analysis Reports |
| | | Build and Test an Automated Install |
| | | Roll Out the Software and Hardware in a Practical Manner |
| | | Provide Mechanisms for Feedback |
| | | After Initial Pilot Rollout, Get the Executives Involved |
| | | Start Addressing Issues of Scalability and Manageability for Rollout |
| | | Near the End of the Pilot, Start Discussing the Next Steps |
| | | Wrap Up the Pilot |
| | | Make a Go/No Go Decision |
| | | Build a Transition Book |
| | | Conclusion |
| | | Chapter 14. Preparing for the Rollout |
| | | Why Is This Chapter So Short? |
| | | Conclusion |
| | Part 4: Future and Conclusions |
| | | Chapter 15. The Future of Biometric Authentication |
| | | Will Biometrics Be Integrated Everywhere? |
| | | What Other Biometric Measures Will Exist? |
| | | A Futuristic Example: New Form of "Caller ID " |
| | | Conclusion |
| | Glossary |
| | Bibliography |