Biometrics and Network Security (Paperback)
Paul Reid
- 出版商: Prentice Hall
- 出版日期: 2003-12-30
- 售價: $1,840
- 貴賓價: 9.5 折 $1,748
- 語言: 英文
- 頁數: 288
- 裝訂: Paperback
- ISBN: 0131015494
- ISBN-13: 9780131015494
-
相關分類:
資訊安全
已絕版
買這商品的人也買了...
-
$440$374 -
$980$774 -
$480$379 -
$880$695 -
$480$379 -
$1,030$1,009 -
$1,860$1,767 -
$399CCNA Self-Study: CCNA Basics (CCNAB) (Hardcover)
-
$590$466 -
$750$675 -
$560$504 -
$580$458 -
$390$304 -
$720$612 -
$480$379 -
$750$593 -
$590$460 -
$1,986Code Complete: A Practical Handbook of Software Construction, 2/e (Paperback)
-
$490$382 -
$650$507 -
$450$405 -
$860$679 -
$650$507 -
$875Practical VoIP Security
-
$1,970$1,872
相關主題
商品描述
Summary
A guide to integrating biometrics in the process of network security. Covers: finger, iris, retina, voice and fac biometrics. Emphasis on how to quantify the strength of a particular biometric. Complete with guidelines for deployment in a large enterprise, one of author's clients is Citibank and they are about to start using biometrics in their network authentication system around the world.
Table of Contents
Foreword.
Preface.
Acknowledgments.I. INTRODUCTION AND BACKGROUND.
1. Introduction.
What Makes This Book Different? The Structure of This Book. Everything You Need to Know about Biometrics to Understand the First Three Chapters. Who Should Read This Book? Conclusion.2. Authentication Technologies.
Something You Know. Something You Have. Something You Are. The Need for Strong Authentication. The role of Strong Authentication with Single Sign-On (SSO). Biometric Technologies: An Intelligent Solution. Conclusion.3. Protecting Privacy with Biometrics and Policy.
Employer's Right to Privacy. Employee's Right to Privacy. Conclusion.II. BIOMETRIC TECHNOLOGIES.
4. Biometric Technologies.
User Interaction with Biometric Technology. What Makes a Good Biometric? What Makes a Good Biometric for Network Security? Conclusion.5. Finger Biometric Technologies.
General Description of Fingerprints. How Is the Finger Imaged? Types of Algorithms Used for Interpretation. How Can this Biometric be Spoofed? Conclusion.6. Face Biometric Technologies.
General Description of Face Biometrics. How Is the Face Imaged? What Types of Algorithms Are Used for Facial Interpretation? How Can This Biometric Be Spoofed? Conclusion.7. Voice Biometric Technologies.
General Description of Voice Biometrics. How Is the Voice Captured? Types of Algorithms Used for Voice Interpretation. How Can This Biometric Be Spoofed? Conclusion.8. Iris Biometric Technology.
General Description of Iris Biometrics. How Is the Iris Captured? Description of the Iris Algorithm. How Can This Biometric Be Spoofed? Conclusion.III. IMPLEMENTING BIOMETRICS FOR NETWORK SECURITY.
9. Recommended Biometric for Network Security.
Finger Biometrics. Face Biometrics. Voice Biometrics. Iris Biometrics. The Choice of a Biometric for Network Access. Conclusion.10. An Introduction to Statistical Measures of Biometrics.
FAR. FRR. FTE. EER. What Measure Is Most Important? Conclusion.11. The Biometric Transaction.
Securing and Trusting a Biometric Transaction. Matching Location. Conclusion.12. Preparing for the Proof of Concept and Selecting a Vendor.
Define the Driver of the Project as Either Corporate IT or a Business Need. Define the Business Need or Objectives. Designate the Internal Sponsor of the Project. Define the Stakeholders. Define a Clear Set of Goals and Success Criteria for the Project. Form and Charter the POC Group. Based on the Goals and Success Criteria, Invite a Few Vendors to Pilot. Set the Timelines for the POC and Ensure That the Implementation Activities Are Done Within the Scope of the POC. Deploy the POC. Monitor and Evaluate the POC. Wrap Up the POC. Decide on the Validity of Each Vendor's Solution. Make a Go/No Go Decision to Move Ahead. Announce the Results and Lay the Groundwork for the Next Phase. Conclusion.13. Preparing for the Pilot Deployment.
Define the Group of Stakeholders. Put in Place a Project Management Team That Can See the Solution Through to Rollout. Form and Charter the Pilot Group. Develop Policy Documents. Summarize Daily Reports Weekly and Send Them Out. Address and Track Problems and Solutions As They Happen. Put a Training Plan in Place. Prepare Audit and Analysis Reports. Build and Test an Automated Install. Roll Out the Software and Hardware in a Practical Manner. Provide Mechanisms for Feedback. After Initial Pilot Rollout, Get the Executives Involved. Start Addressing Issues of Scalability and Manageability for Rollout. Near the End of the Pilot, Start Discussing the Next Steps. Wrap Up the Pilot. Make a Go/No Go Decision. Build a Transition Book. Conclusion.14. Preparing for the Rollout.
Why Is This Chapter So Short? Conclusion.IV. FUTURE AND CONCLUSIONS.
15. The Future of Biometric Authentication.
Will Biometrics Be Integrated Everywhere? What Other Biometric Measures Will Exist? A Futuristic Example: New Form of “Caller ID”. Conclusion.Glossary.Bibliography.Index.