Security and Access Control Using Biometric Technologies, 1st Edition

  • Robert Newman Georgia Southern University
  • ISBN-10: 1435441052  |  ISBN-13: 9781435441057
  • 512 Pages
  • © 2010 | Published
  • List Price = $ 131.95
  • For quantity discounts, Contact your Representative
  • For single copy purchases, visit



The modern rapid advancements in networking, communication, and mobility have increased the need for reliable ways to verify the identity of any person. Security and Access Control Using Biometric Technologies is the ideal book for any reader interested in learning the basics of biometric systems, or the study of methods for uniquely recognizing humans based on intrinsic physical or behavioral traits. Written for a broad level of readers, this book applies to students, network managers, security administrators and other practitioners. The book begins with the basics of biometric technologies and discusses how and why biometric systems are emerging in information security. An emphasis is directed towards authentication, authorization, identification, and access control. Topics covered include security and management that is required to protect valuable computer and network resources and assets, and methods of providing control over access and security for computers and networks.

Features and Benefits

  • Presents access control techniques using biometric methods to provide protection to an organization's assets and resources and to lessen threats that are inherent on the Internet and in a networking environment.
  • Addresses security and privacy issues, which includes industry standards and legal issues, that arise from the use of biometric systems.
  • Introduces hardware and software applications that would be utilized in a biometric security environment.
  • Provides helpful tools to manage, implement and operate biometric applications.
  • Features extensive leaning aids such as Key Terms, Review Questions and Discussion Exercises that further enhance the reader's understanding of material covered. Hands-On Projects provide research activities and a progressive case project places readers in the role of security consultant.

Table of Contents

1. Access Control Using Biometrics.
2. Biometric Traits and Modalities.
3. Biometric Applications and Solutions.
4. Repositories for Database and Template Storage.
5. Legacy and Biometric Systems.
6. Uni-Modal, Multi-modal, and Multi-biometrics Integration.
7. Policy and Program Management.
8. Access Control Methods and Technologies.
9. System Confidentiality, Integrity, and Accessibility.
10. Security and Privacy Issues.
11. Implementation, Operation, and Management Issues.
12. Standards, Organizations, and Legal Environment.
A: Biometrics acronyms.
B: Biometrics vendors.

Meet the Author

Author Bio

Robert Newman

Robert C. Newman is currently a lecturer of Information Systems in the College of Information Technology at Georgia Southern University. His most previous assignment was Associate Professor of Telecommunications Management at DeVry University. Newman has a B.S. from University of Southern Carolina Columbia, and has completed graduate M.S. course work in Computer Science at University of Alabama He started his career at the University of South Carolina in the Computer Science Department, where he held a number of positions in a large computer operation, including operations manager. He has taught in the computer information technology departments in a number of colleges and universities. He is currently active in computer forensics and enterprise information systems security education and is an active speaker on these topics. Robert's professional experience includes many years in the telephone industry, in numerous positions at BellSouth and AT&T. He gathered hands-on networking knowledge in software development, broadband operations, and network management and surveillance at BellSouth. Early in his career, he developed a solid background in IBM mainframe hardware and software and business applications. Robert has been a member of federal, state, and county law enforcement agencies in Georgia, Alabama, and South Carolina. He is a graduate of the Northeast Georgia Police Academy and Georgia Post Certified (GaPOST) and a Certified Information Systems Security Professional (CISSP). He is an active member of the FBI's Coastal Empire Infragard Organization. He has accumulated a wealth of knowledge concerning the security and protection of data and computer resources and network administration. Security lectures are part of the Network Administration, Management Information Systems, Computer Forensics, and Data Communications courses currently taught by the author. He is a published author of three college-level Security books.