Flylib.com
Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)
Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)
ISBN: 0131015494
EAN: 2147483647
Year: 2003
Pages: 123
Authors:
Paul Reid
BUY ON AMAZON
Biometrics for Network Security
Table of Contents
Copyright
Prentice Hall PTR Series in Computer Networking and Distributed Systems
About Prentice Hall Professional Technical Reference
Foreword
Preface
Acknowledgments
Part 1: Introduction and Background
Chapter 1. Introduction
What Makes This Book Different?
The Structure of This Book
Everything You Need to Know about Biometrics to Understand the First Three Chapters
Who Should Read This Book?
Conclusion
Chapter 2. Authentication Technologies
Something You Know
Something You Have
Something You Are
The Need for Strong Authentication
The Role of Strong Authentication with Single Sign-On (SSO)
Biometric Technologies: An Intelligent Solution
Conclusion
Chapter 3. Protecting Privacy with Biometrics and Policy
Employer s Right to Privacy
Employee s Right to Privacy
Conclusion
Part 2: Biometric Technologies
Chapter 4. Biometric Technologies
User Interaction with Biometric Technology
What Makes a Good Biometric?
What Makes a Good Biometric for Network Security?
Conclusion
Chapter 5. Finger Biometric Technologies
General Description of Fingerprints
How Is the Finger Imaged?
Types of Algorithms Used for Interpretation
How Can this Biometric be Spoofed?
Conclusion
Chapter 6. Face Biometric Technologies
General Description of Face Biometrics
How Is the Face Imaged?
What Types of Algorithms Are Used for Facial Interpretation?
How Can This Biometric Be Spoofed?2
Conclusion
Chapter 7. Voice Biometric Technologies
General Description of Voice Biometrics
How Is the Voice Captured?
Types of Algorithms Used for Voice Interpretation
How Can This Biometric Be Spoofed?
Conclusion
Chapter 8. Iris Biometric Technology1
General Description of Iris Biometrics
How Is the Iris Captured?
Description of the Iris Algorithm
How Can This Biometric Be Spoofed?
Conclusion
Part 3: Implementing Biometrics for Network Security
Chapter 9. Recommended Biometric for Network Security
Finger Biometrics
Face Biometrics
Voice Biometrics
Iris Biometrics
The Choice of a Biometric for Network Access
Conclusion
Chapter 10. An Introduction to Statistical Measures of Biometrics
FAR
FRR
FTE
EER
What Measure Is Most Important?
Conclusion
Chapter 11. The Biometric Transaction
Securing and Trusting a Biometric Transaction
Matching Location
Conclusion
Chapter 12. Preparing for the Proof of Concept and Selecting a Vendor
Define the Driver of the Project as Either Corporate IT or a Business Need
Define the Business Need or Objectives
Designate the Internal Sponsor of the Project
Define the Stakeholders
Define a Clear Set of Goals and Success Criteria for the Project
Form and Charter the POC Group
Based on the Goals and Success Criteria, Invite a Few Vendors to Pilot
Set the Timelines for the POC and Ensure That the Implementation Activities Are Done Within the Scope of the POC
Deploy the POC
Monitor and Evaluate the POC
Wrap Up the POC
Decide on the Validity of Each Vendor s Solution
Make a GoNo Go Decision to Move Ahead
Announce the Results and Lay the Groundwork for the Next Phase
Conclusion
Chapter 13. Preparing for the Pilot Deployment
Define the Group of Stakeholders
Put in Place a Project Management Team That Can See the Solution Through to Rollout
Form and Charter the Pilot Group
Develop Policy Documents
Summarize Daily Reports Weekly and Send Them Out
Address and Track Problems and Solutions As They Happen
Put a Training Plan in Place
Prepare Audit and Analysis Reports
Build and Test an Automated Install
Roll Out the Software and Hardware in a Practical Manner
Provide Mechanisms for Feedback
After Initial Pilot Rollout, Get the Executives Involved
Start Addressing Issues of Scalability and Manageability for Rollout
Near the End of the Pilot, Start Discussing the Next Steps
Wrap Up the Pilot
Make a GoNo Go Decision
Build a Transition Book
Conclusion
Chapter 14. Preparing for the Rollout
Why Is This Chapter So Short?
Conclusion
Part 4: Future and Conclusions
Chapter 15. The Future of Biometric Authentication
Will Biometrics Be Integrated Everywhere?
What Other Biometric Measures Will Exist?
A Futuristic Example: New Form of
Conclusion
Glossary
Bibliography
Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)
ISBN: 0131015494
EAN: 2147483647
Year: 2003
Pages: 123
Authors:
Paul Reid
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to a Microsoft Excel Workbook
Replacing Null Values in a Strongly Typed DataSet
Finding Rows in a DataView
Specifying Locking Hints in a SQL Server Database
Formatting Column Values When Outputting Data as XML
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP Systems Impact on Organizations
The Effects of an Enterprise Resource Planning System (ERP) Implementation on Job Characteristics – A Study using the Hackman and Oldham Job Characteristics Model
Data Mining for Business Process Reengineering
Healthcare Information: From Administrative to Practice Databases
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
CMS and S/MIME
SSL and TLS
Appendix A Solutions to Exercises
Appendix C Using the Bouncy Castle API for Elliptic Curve
Strategies for Information Technology Governance
Assessing Business-IT Alignment Maturity
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Managing IT Functions
Governance Structures for IT in the Health Care Industry
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 5. The Road Less Traveled by in MapQuest
Hack 23. Explore David Rumseys Historical Maps
Hack 31. Plot Dymaxion Maps in Perl
Hack 33. Georeference an Arbitrary Tourist Map
Hacks 35-46
802.11 Wireless Networks: The Definitive Guide, Second Edition
Challenges for the MAC
RF Propagation with 802.11
The Frequency-Hopping (FH) PHY
TGnSync
Improving Performance
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies