Chapter 1. Introduction
Chapter 2. Authentication Technologies
Chapter 3. Protecting Privacy with Biometrics and Policy