Request for consultation
Security and Access Control Using Biometric Technologies presents an introduction to biometrics or the study of recognizing individuals based on their unique physical or behavioral traits, as they relate to computer security. The book begins with the basics of biometric technologies and discusses how and why biometric systems are emerging in information security. An emphasis is directed towards authentication, authorization, identification, and access control. Topics covered include security and management required to protect valuable computer and network resources and assets, and methods of providing control over access and security for computers and networks. Written for a broad level of readers, this book applies to information system and information technology students, as well as network managers, security administrators and other practitioners. Oriented towards the practical application of biometrics in the real world, Security and Access Control Using Biometric Technologies provides the reader with a realistic view of the use of biometrics in the ever-changing industry of information security.
- Presents access control techniques using biometric methods to provide protection to an organization's assets and resources and to lessen threats that are inherent on the Internet and in a networking environment.
- Addresses security and privacy issues, which includes industry standards and legal issues, that arise from the use of biometric systems.
- Introduces hardware and software applications that would be utilized in a biometric security environment.
- Provides helpful tools to manage, implement and operate biometric applications.
- Features extensive leaning aids such as Key Terms, Review Questions and Discussion Exercises that further enhance the reader's understanding of material covered. Hands-On Projects provide research activities and a progressive case project places readers in the role of security consultant.
1. Access Control Using Biometrics.
2. Biometric Traits and Modalities.
PART II – TECHNOLOGY.
3. Biometric Applications and Solutions.
4. Repositories for Database and Template Storage.
5. Legacy and Biometric Systems.
6. Uni-Modal, Multi-modal, and Multi-biometrics Integration.
PART III – ADMINISTRATION.
7. Policy and Program Management.
8. Access Control Methods and Technologies.
9. System Confidentiality, Integrity, and Accessibility.
10. Security and Privacy Issues.
11. Implementation, Operation, and Management Issues.
12. Standards, Organizations, and Legal Environment.
A: Biometrics acronyms.
B: Biometrics vendors.