Biometric Technologies and Verification Systems

Author:   John R. Vacca (Information Technology Consultant and Researcher, Pomeroy, OH, USA.)
Publisher:   Elsevier Science & Technology
ISBN:  

9780750679671


Pages:   656
Publication Date:   23 April 2007
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $189.95 Quantity:  
Add to Cart

Share |

Biometric Technologies and Verification Systems


Add your own review!

Overview

Full Product Details

Author:   John R. Vacca (Information Technology Consultant and Researcher, Pomeroy, OH, USA.)
Publisher:   Elsevier Science & Technology
Imprint:   Butterworth-Heinemann Ltd
Dimensions:   Width: 19.10cm , Height: 3.30cm , Length: 23.50cm
Weight:   1.090kg
ISBN:  

9780750679671


ISBN 10:   0750679670
Pages:   656
Publication Date:   23 April 2007
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Part 1: Overview Of Biometrics Technology And Verification SystemsCHAPTER 1: What Is Biometrics?CHAPTER 2: Types Of Biometrics Technology And Verification SystemsCHAPTER 3: Biometrics Technology And Verification Systems StandardsPart 2: How Biometrics Eye Analysis Technology WorksCHAPTER 4: How Iris Pattern Recognition WorksCHAPTER 5: How Retina Pattern Recognition WorksPart 3: How Biometrics Facial Recognition Technology WorksCHAPTER 6: How Video Face Recognition WorksCHAPTER 7: How Facial Thermal Imaging In The Infrared Spectrum WorksPart 4: How Biometrics Finger Scanning Analysis Technology WorksCHAPTER 8: How Finger Image Capture WorksCHAPTER 9: How Fingerscanning Verification And Recognition WorksPart 5: How Biometrics Geometry Analysis Technology WorksCHAPTER 10: How Hand Geometry Image Technology WorksCHAPTER 11: How Finger Geometry Technology WorksPart 6: How Biometrics Verification Technology WorksCHAPTER 12: How Dynamic Signature Verification Technology WorksCHAPTER 13: How Voice Recognition Technology WorksCHAPTER 14: How Keystroke Dynamics Technology WorksCHAPTER 15: How Palm Print Pattern Recognition Technology WorksCHAPTER 16: How Vein Pattern Analysis Recognition Technology WorksCHAPTER 17: How Ear Shape Analysis Technology Works CHAPTER 18: How Body Odor And/Or Scent Analysis And Other Advanced Technology WorksCHAPTER 19: How DNA Measurement Technology WorksPart 7: How Privacy Enhanced Biometrics Based Verification/Authentication WorksCHAPTER 20: How Fingerprint Verification/Authentication Technology WorksCHAPTER 21: Vulnerable Points Of A Biometric Verification SystemCHAPTER 22: How Brute Force Attacks WorkCHAPTER 23: How Data Hiding Technology WorksCHAPTER 24: Image-Based Challenges/Response MethodsCHAPTER 25: How Cancelable Biometrics WorkPart 8: Large-Scale Implementation/Deployment Of Biometrics Technologies And Verification SystemsCHAPTER 26: Specialized Biometrics Enterprise DeploymentCHAPTER 27: How to Implement Biometrics Technology And Verification SystemsPart 9: Biometrics Solutions And Future DirectionsCHAPTER 28: How Mapping The Body Technology WorksCHAPTER 29: Selecting Biometric SolutionsCHAPTER 30: Biometric Benefits

Reviews

This text would be extremely useful as a ready reference for a seasoned security professional or as a primer for a novice. The author has struck a fine balance between the details and the big picture, and his book amply lives up to the desired purpose of the book. Right from this book's introductory lines until the end, Vacca demonstrates his excellent acumen in expressing a complex subject is very accesible prose, making it easy to understand. Security Management, Col. Kuljeet Singh, CPP


This text would be extremely useful as a ready reference for a seasoned security professional or as a primer for a novice. The author has struck a fine balance between the details and the big picture, and his book amply lives up to the desired purpose of the book. Security Management, Col. Kuljeet Singh, CPP


This text would be extremely useful as a ready reference for a seasoned security professional or as a primer for a novice. The author has struck a fine balance between the details and the big picture, and his book amply lives up to the desired purpose of the book. Right from this book's introductory lines until the end, Vacca demonstrates his excellent acumen in expressing a complex subject is very accesible prose, making it easy to understand. Security Management, Col. Kuljeet Singh, CPP


"""This text would be extremely useful as a ready reference for a seasoned security professional or as a primer for a novice."" ""The author has struck a fine balance between the details and the big picture, and his book amply lives up to the desired purpose of the book."" ""Right from this book's introductory lines until the end, Vacca demonstrates his excellent acumen in expressing a complex subject is very accesible prose, making it easy to understand. "" Security Management, Col. Kuljeet Singh, CPP"


Author Information

John Vacca is an information technology consultant, professional writer, editor, reviewer and internationally-known, best-selling author based in Pomeroy, Ohio. Since 1982, John has authored 72 books, including: Identity Theft (Cybersafety) (Publisher: Chelsea House Pub (April 1, 2012 ); System Forensics, Investigation, And Response (Publisher: Jones & Bartlett Learning (September 24, 2010); Managing Information Security (Publisher: Syngress (an imprint of Elsevier Inc.) (March 29, 2010)); Network and Systems Security (Publisher: Syngress (an imprint of Elsevier Inc.) (March 29, 2010)); Computer and Information Security Handbook (Publisher: Morgan Kaufmann (an imprint of Elsevier Inc.) (June 2, 2009)); Biometric Technologies and Verification Systems (Publisher: Elsevier Science & Technology Books (March 16, 2007)); Practical Internet Security (Hardcover): (Publisher: Springer (October 18, 2006)); Optical Networking Best Practices Handbook (Hardcover): (Publisher: Wiley-Interscience (November 28, 2006)); Computer Forensics: Computer Crime Scene Investigation (With CD-ROM), 2nd Edition (Publisher: Charles River Media (May 26, 2005) John Vacca has also written more than 600 articles in the areas of advanced storage, computer security and aerospace technology (copies of articles and books are available upon request). John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program, from 1988 until his retirement from NASA in 1995. In addition, John is also an independent online book reviewer. Finally, John was one of the security consultants for the MGM movie titled: ""AntiTrust,"" which was released on January 12, 2001.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List