
Average Reviews:

(More customer reviews)A very good and readable book about biometrics for network security. Note the network security part - the coverage is limited to systems that can be used in an everyday business environment. The book could be read by just about anyone, although it does help knowing a little bit about biometrics to start with. There are basically two main parts - the first one describes the different biometric technologies and their strengths and weaknesses. The second part discusses actual testing and deployment using real life examples of what to do and what not to do. I would certainly recommend this book to anyone who is actually going to implement a biometric system. Just knowing how the biometrics work is not enough to have a successful deployment. If you want to know the full details of how different biometric algorithms work, this book is probably not for you. The level of detail is just what you would take away from reading the detailed description, which I actually liked. I would recommend this book to anyone interested in network security.
Click Here to see more reviews about: Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)
The biggest vulnerability in most enterprise networks is the authenticationsystem--especially if it relies solely on passwords. And a result, many companiesare looking to combine password authentication with other authenticationmethods, most especially biometrics. The few biometrics books that do existare overview books aimed at management and/or are not written by biometricspecialists. This book is unique in its coverage of how to design and implementa successful biometric solution for your network--and, it's written by abiometrics expert.Biometrics are automated methods of recognizing a person based on aphysiological or behavioral characteristic. Among the features measured are;face, fingerprints, hand geometry, handwriting, iris, retinal, and voice.Biometric technologies are becoming the foundation of an extensive array ofhighly secure identification and personal verification solutions. As the level ofsecurity breaches and transaction fraud increases, the need for highly secureidentification and personal verification technologies is becoming apparent.
0 comments:
Post a Comment