Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Biometrics: Identity Verification in a Networked World

Buy

An in-depth look at biometrics, focused on critical issues such as accuracy, privacy, technology capabilities, and cost-effective deployment

No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce fraud. Along with this broad-scale deployment comes a wide range of critical issues, including privacy risks, secure biometric system design, and the strengths and weaknesses of leading technologies such as finger-scan, iris-scan, facial-scan, voice-scan, and signature-scan. A full understanding of the biometric technologies, applications, and markets is required for successful utilization of biometrics in today’s enterprise environment.

Written by leading industry authorities, this book provides you with everything you need to know about the technology, the industry, the applications, and the challenges that define biometrics today. It explains why institutions are turning to biometrics to authenticate employees, customers, and citizens in mission-critical applications. It also provides a broad conceptual understanding of the technology, explains specialized terms and concepts, and concludes with an analysis of the factors you must consider when designing, deploying, and maintaining biometric systems.

Reviewing large-scale project examples, the authors:

  • Discuss the metrics used to determine how well biometric systems operate
  • Define how biometric deployments can be privacy-enhancing or privacy-invasive
  • Dispel various myths and misunderstandings surrounding biometric technology
  • Address topics such as system com-ponents, data acquisition, template generation and matching, and typical deployments for each biometric technology

Wiley Tech Briefs

Focused on the needs of the corporate IT and business manager, the Tech Briefs series provides in-depth information on new or emerging technologies, solutions, and vendor offerings available in the marketplace.

With their accessible approach, these books will help you get quickly up-to-speed on a topic so that you can effectively compete, grow, and better serve your customers.

About the Author

SAMIR NANAVATI is a founding partner of International Biometric Group, LLC, a biometric consulting and integration firm cofounded in 1996. Mr. Nanavati is cited frequently by several leading publications such as U.S. News & World Report, the New York Times, and The Industry Standard. He is also the author of fourteen analyses on the state of the biometric industry.

MICHAEL THIEME is a Senior Consultant with International Biometric Group. He has written extensively on a variety of biometric topics including IT security, deployment issues, and privacy. Mr. Thieme served on the Biometric Interoperability Subcommittee of the GSA Smart Access project and is also a member of the ANSI NIST B10.8 Biometric Subcommittee as well as a founder of the BioPrivacy Initiative.

RAJ NANAVATI is a cofounding partner at International Biometric Group, LLC. He lectures extensively on the technical, business, and policy issues associated with using biometrics. He has been quoted extensively in major media publications, including the New York Times, and has been featured on National Public Radio. He has also submitted testimony on biometrics to Congress.

(HTML tags aren't allowed.)

Medical Infrared Imaging
Medical Infrared Imaging

Rapid evolution of technical advances in infrared sensor technology, image processing, “smart” algorithms, databases, and system integration paves the way for new methods of research and use in medical infrared imaging. These breakthroughs permit easy-to-use, high-sensitivity imaging that can address key issues of diagnostic...

Piano for Dummies
Piano for Dummies
At first glance, a piano may seem like an intimidating instrument that would be very difficult to learn how to play, but despite what your seventh-grade piano teacher may say, playing piano isn't brain surgery. It just takes time, practice, and patience.

Piano For Dummies starts at the very beginning and walks you through...

Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...


Practical Guide to Hydrogenated Nitrile Butadiene Rubber Technology
Practical Guide to Hydrogenated Nitrile Butadiene Rubber Technology

Hydrogenated Nitrile Butadiene Rubber (HNBR) is a synthetic polymer that results from the hydrogenation of Nitrile Rubber (NBR). It is widely known for its physical strength and retention of properties after long-term exposure to heat, oil and chemicals. The unique properties attributed to it have resulted in wide adoption of HNBR in...

Understanding Broadband over Power Line
Understanding Broadband over Power Line
Understanding Broadband over Power Line explores all aspects of the emerging technology that enables electric utilities to provide support for high-speed data communications via their power infrastructure. This book examines the two methods used to connect consumers and businesses to the Internet through the utility infrastructure: the existing...
Modeling the Internet and the Web: Probabilistic Methods and Algorithms
Modeling the Internet and the Web: Probabilistic Methods and Algorithms
The World Wide Web is growing in size at a remarkable rate.  It is a huge evolving system and its data are rife with uncertainties.  Probability and statistics are the fundamental mathematical tools that enable us to model, reason and infer meaningful results from such data.  Modelling the Internet and the Web covers the...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy