Request for consultation

Thanks for your request. You’ll soon be chatting with a consultant to get the answers you need.
{{formPostErrorMessage.message}} [{{formPostErrorMessage.code}}]
First Name is required. 'First Name' must contain at least 0 characters 'First Name' cannot exceed 0 characters Please enter a valid First Name
Last Name is required. 'Last Name' must contain at least 0 characters 'Last Name' cannot exceed 0 characters Please enter a valid Last Name
Institution is required.
Discipline is required.
Why are you contacting us today? is required. 'Why are you contacting us today?' must contain at least 0 characters 'Why are you contacting us today?' cannot exceed 0 characters Please enter a valid Why are you contacting us today?


Security and Access Control Using Biometric Technologies presents an introduction to biometrics or the study of recognizing individuals based on their unique physical or behavioral traits, as they relate to computer security. The book begins with the basics of biometric technologies and discusses how and why biometric systems are emerging in information security. An emphasis is directed towards authentication, authorization, identification, and access control. Topics covered include security and management required to protect valuable computer and network resources and assets, and methods of providing control over access and security for computers and networks. Written for a broad level of readers, this book applies to information system and information technology students, as well as network managers, security administrators and other practitioners. Oriented towards the practical application of biometrics in the real world, Security and Access Control Using Biometric Technologies provides the reader with a realistic view of the use of biometrics in the ever-changing industry of information security.

Robert Newman, Georgia Southern University

Robert C. Newman is currently a lecturer of Information Systems in the College of Information Technology at Georgia Southern University. His most previous assignment was Associate Professor of Telecommunications Management at DeVry University. Newman has a B.S. from University of Southern Carolina Columbia, and has completed graduate M.S. course work in Computer Science at University of Alabama He started his career at the University of South Carolina in the Computer Science Department, where he held a number of positions in a large computer operation, including operations manager. He has taught in the computer information technology departments in a number of colleges and universities. He is currently active in computer forensics and enterprise information systems security education and is an active speaker on these topics. Robert's professional experience includes many years in the telephone industry, in numerous positions at BellSouth and AT&T. He gathered hands-on networking knowledge in software development, broadband operations, and network management and surveillance at BellSouth. Early in his career, he developed a solid background in IBM mainframe hardware and software and business applications. Robert has been a member of federal, state, and county law enforcement agencies in Georgia, Alabama, and South Carolina. He is a graduate of the Northeast Georgia Police Academy and Georgia Post Certified (GaPOST) and a Certified Information Systems Security Professional (CISSP). He is an active member of the FBI's Coastal Empire Infragard Organization. He has accumulated a wealth of knowledge concerning the security and protection of data and computer resources and network administration. Security lectures are part of the Network Administration, Management Information Systems, Computer Forensics, and Data Communications courses currently taught by the author. He is a published author of three college-level Security books.
  • Presents access control techniques using biometric methods to provide protection to an organization's assets and resources and to lessen threats that are inherent on the Internet and in a networking environment.
  • Addresses security and privacy issues, which includes industry standards and legal issues, that arise from the use of biometric systems.
  • Introduces hardware and software applications that would be utilized in a biometric security environment.
  • Provides helpful tools to manage, implement and operate biometric applications.
  • Features extensive leaning aids such as Key Terms, Review Questions and Discussion Exercises that further enhance the reader's understanding of material covered. Hands-On Projects provide research activities and a progressive case project places readers in the role of security consultant.
1. Access Control Using Biometrics.
2. Biometric Traits and Modalities.
3. Biometric Applications and Solutions.
4. Repositories for Database and Template Storage.
5. Legacy and Biometric Systems.
6. Uni-Modal, Multi-modal, and Multi-biometrics Integration.
7. Policy and Program Management.
8. Access Control Methods and Technologies.
9. System Confidentiality, Integrity, and Accessibility.
10. Security and Privacy Issues.
11. Implementation, Operation, and Management Issues.
12. Standards, Organizations, and Legal Environment.
A: Biometrics acronyms.
B: Biometrics vendors.

Textbook Only Options

Traditional eBook and Print Options

{{collapseContainerClosed['detail_0'] ? 'Show More' : 'Show Less'}}

  • ISBN-10: 1133477208
  • ISBN-13: 9781133477204
  • STARTING AT $15.99

  • STARTING AT $20.49

  • ISBN-10: 1435441052
  • ISBN-13: 9781435441057
  • Bookstore Wholesale Price $97.50
  • RETAIL $129.95