home libri books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

das ravi - biometric technology

Biometric Technology Authentication, Biocryptography, and Cloud-Based Architecture




Disponibilità: Normalmente disponibile in 20 giorni
A causa di problematiche nell'approvvigionamento legate alla Brexit sono possibili ritardi nelle consegne.


PREZZO
169,98 €
NICEPRICE
161,48 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Routledge

Pubblicazione: 10/2014
Edizione: 1° edizione





Note Editore

Most biometric books are either extraordinarily technical for technophiles or extremely elementary for the lay person. Striking a balance between the two, Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture is ideal for business, IT, or security managers that are faced with the task of making purchasing, migration, or adoption decisions. It brings biometrics down to an understandable level, so that you can immediately begin to implement the concepts discussed.Exploring the technological and social implications of widespread biometric use, the book considers the science and technology behind biometrics as well as how it can be made more affordable for small and medium-sized business. It also presents the results of recent research on how the principles of cryptography can make biometrics more secure. Covering biometric technologies in the cloud, including security and privacy concerns, the book includes a chapter that serves as a "how-to manual" on procuring and deploying any type of biometric system. It also includes specific examples and case studies of actual biometric deployments of localized and national implementations in the U.S. and other countries.The book provides readers with a technical background on the various biometric technologies and how they work. Examining optimal application in various settings and their respective strengths and weaknesses, it considers ease of use, false positives and negatives, and privacy and security issues. It also covers emerging applications such as biocryptography.Although the text can be understood by just about anybody, it is an ideal resource for corporate-level executives who are considering implementing biometric technologies in their organizations.




Sommario

An Introduction to Biometrics Our Unique Features: Physiological and BehavioralHow Our Unique Features Can Positively Identify Us: The World of Biometrics A Formal Definition of Biometrics What Is Recognition? Physiological and Behavioral Biometrics What the Future Holds The Granular Components of Recognition Defining the Biometric Template The Mathematical Files of the Biometric Templates Understanding Some of the Myths Behind Biometrics Understanding the Differences of Verification and Enrollment Templates Summary of Points Covered The Biometric Process Illustrated For the CIO: What Biometric System to Procure? For the CIO: Important KPIs to Be Examined Looking beyond the KPI U.S. Federal Government Biometric Metrics and KPI Biometric Data Interchange Formats Common Biometric Exchange Format Framework Biometric Technical Interface Standards U.S. Federal Government Biometric Testing Standards A Review of Biometric Sensors Optical Scanners Solid-State Sensors Ultrasound Sensors Temperature Differential Sensors Multispectral Imaging Sensors Touchless Fingerprint Sensors CCD Cameras 3-D Sensors/Review of Biometric Sensors in Use The Disadvantages of Sensors Typical Biometric Market Segments Logical Access Control Physical Access Control Time and Attendance Law Enforcement SurveillanceReview of Chapter 1A Review of the Present and Future Biometric TechnologiesThe Biometric Technologies of Today: Physical and Behavioral Differences between Physical Biometrics and Behavioral Biometrics Which One to Use: Physical or Behavioral Biometrics? Fingerprint Recognition The Unique Features The Process of Fingerprint Recognition Fingerprint Recognition Quality Control Checks Methods of Fingerprint Collection The Matching Algorithm Fingerprint Recognition: Advantages and Disadvantages Market Applications of Fingerprint RecognitionHand Geometry Recognition Hand Geometry Recognition: Enrollment Process Hand Geometry Recognition: Advantages and Disadvantages Vein Pattern Recognition Components of Vein Pattern Recognition How Vein Pattern Recognition Works Vein Pattern Recognition: Advantages and Disadvantages Palm Print Recognition How Palm Print Recognition Works Palm Print Recognition: Advantages and Disadvantages Facial Recognition Facial Recognition: How It Works Defining the Effectiveness of a Facial Recognition System Techniques of Facial Recognition Facial Recognition: Advantages and Disadvantages Applications of Facial Recognition The Eye: The Iris and the Retina The Iris The Physiological Structure of the Iris Iris Recognition: How It Works The Market Applications of Iris Recognition Iris Recognition: Advantages and Disadvantages The Retina The Physiology of the Retina The Process of Retinal Recognition Retinal Recognition: Advantages and DisadvantagesVoice Recognition Voice Recognition: How It Works Factors Affecting Voice Recognition Voice Recognition: Advantages and Disadvantages The Market Applications of Voice Recognition Signature Recognition The Differences between a Signature and Signature Recognition Signature Recognition: How It Works Signature Recognition: Advantages and Disadvantages Keystroke Recognition Keystroke Recognition: How It Works Keystroke Recognition: Advantages and Disadvantages Biometric Technologies of the Future DNA Recognition DNA Recognition: How It Works DNA Recognition: Advantages and Disadvantages Gait Recognition The Process behind Gait Recognition Gait Recognition: Advantages and Disadvantages Earlobe Recognition Earlobe Recognition: How It Works Earlobe Recognition: Advantages and DisadvantagesReview of Chapter 2 For the C-Level Executive: A Biometrics Project Management GuideBiometric Technology System Architecture Sensing and Data Acquisition Multimodal Biometric Systems Single Sign-On Solutions Implementing a Multimodal Biometric System Challenges with Multimodal Biometric SystemsSignal and Image Processing Preprocessing of the Biometric Raw Image Quality Control Checks Image Enhancement Feature Extraction Postprocessing Data Compression Data Storage Search and Retrieval Techniques Database Search Algorithms Backup and Recovery of the Database Database Configurations Template Matching Threshold Decision Making Administration Decision Making Biometric Templates Adaptation Establishment of the Security Threshold Values Reporting and Control System Mode Adjustment Privileges to End UsersData Transmission Biometrics Project Management System Concepts and Classification Schemes Upgrading to a Newer Biometric System? The Feasibility Study Application Classifiers System Design and Interoperability Factors and Considerations COTS -Based Biometric Systems Proprietary or Open-Ended System? Infrastructure Assessment The Human Equation Ergonomic Issues The Feedback System Population Dynamics Systems Requirements Analysis System Requirements Elicitation System Requirement Analysis and Regulation System Requirements Documentation System Requirements Validation Biometric System Specifications System Architectural and Processing Designs Storage and Matching Combinations Operational Architecture Design—Multimodal Systems The Information Processing Architecture Subsystem Analysis and Design Data Storage Subsystem Design Considerations Database Management System Determining the Security Threshold Subsystem Implementation and Testing System Deployment and Integration Middleware The Biometric Interface End User/Administrator Training System Maintenance Upgrading an Existing System/Fine Tuning System Reports and Logs System Networking Network Processing Loads A Networking Scenario Biometric Networking Topologies Data Packets Data Packet Subcomponents Data Packet Switching Network Protocols TCP/IP Client–Server Network Topology Peer-to-Peer Network Topology Routers Routing Tables Network Traffic CollisionsReview of Chapter 3 An Introduction to Biocryptography Cryptography and Biocryptography Introduction to Cryptography Message Scrambling and Descrambling Encryption and Decryption Ciphertexts Symmetric Key Systems and Asymmetric Key Systems The Caesar Methodology Types of Cryptographic Attacks Polyalphabetic Encryption 210 Block Ciphers Initialization Vectors Cipher Block Chaining Disadvantages of Symmetric Key Cryptography The Key Distribution Center Mathematical Algorithms with Symmetric Cryptography The Hashing Function Asymmetric Key Cryptography Keys and Public Private Keys The Differences between Asymmetric and Symmetric Cryptography The Disadvantages of Asymmetric Cryptography The Mathematical Algorithms of Asymmetric Cryptography The Public Key Infrastructure The Digital Certificates How PKI Works PKI Policies and Rules The Lightweight Directory Access Protocol The Public Cryptography Standards Parameters of Public Keys and Private Keys How Many Servers? Security Policies Securing the Public Keys and the Private Keys Message Digests and Hashes Security Vulnerabilities of Hashes Virtual Private Networks IP Tunneling Mobile VPNs Is the VPN Worth It? Conducting a VPN Cost–Benefit Analysis Implementing a VPN The Components of a VPN Security Policy End Users and Employees The Network Requirements Building Your Own VPN Impacts to the Web Server Impacts to the Application Server Impacts to the Database Server Impacts to the Firewall VPN Testing Implementing a VPN Managing Public and Private Key Exchanges The Access Control List Internet Drafts Four Vulnerabilities of a Biometrics VPN Biocryptography The Cipher Biometric Template Biocryptography Keys A Review of How Biocryptography Can Be Used to Further Protect Fingerprint and Iris Templates Biocryptography in a Single Biometric System Biocryptography in a Client–Server Biometric System Biocryptography in a Hosted Biometrics EnvironmentBiocryptography and VPNs IPSec Review of Chapter 4An Introduction to Biometrics in the CloudIntroduction to Cloud Computing The Basic Concepts and Terminology Surrounding Cloud Computing The Cloud Two Distinctions The IT Resource On Premise Scalability Asset S




Autore

Ravindra Das was born and raised in West Lafayette, Indiana. He received his undergraduate degree from Purdue University, MS from Southern Illinois University, Carbondale, Illinois, and MBA from Bowling Green State University in international trade and management information systems, respectively.He has been involved in biometrics for more than 15 years and currently owns a biometrics consultancy firm (Apollo Biometrics) based in Chicago, Illinois. He has been published extensively in Europe.










Altre Informazioni

ISBN:

9781466592452

Condizione: Nuovo
Dimensioni: 9.25 x 6.25 in Ø 1.35 lb
Formato: Copertina rigida
Illustration Notes:28 b/w images
Pagine Arabe: 374


Dicono di noi