* Biometrics authentication, which relies on fingerprints, speech, or other physical characteristics, is an increasingly important means of protecting critical data* Gives security professionals specific guidelines, applications, and procedures for implementing a biometric security system in a LAN, WAN, or wireless infrastructure* Covers fingerprint identification, hand geometry, speaker recognition, face location, retina scanning, and multibiometrics* Companion Web site contains articles, papers, source code, and product guides
Read More
This handbook provides explanations and examples for understanding, implementing, and applying biometric computer security authentication methods and setting up a biometric security system in a LAN, WAN, or wireless infrastructure. The book tells how to determine the most effective form of biometric security to meet an organization's needs, looking at strengths and drawbacks of fingerprint identification, hand geometry, speaker recognition, face location, and retinal scanning. A Web site provides source code and articles. Chirillo has written other books on computer security. Blaul works in the private sector. Annotation ©2004 Book News, Inc., Portland, OR (booknews.com)
Read Less