Security and access control using biometric technologies / Robert Newman.
نوع المادة :![نص](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 9781435496675
- 1435496671
- 9781435441057
- 1435441052
- TK7882.B56 N496 2010
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK7882.B56 N496 2010 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 300100313382 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
TK7882.B56 M34 2011 When biometrics fail : gender, race, and the technology of identity / | TK7882.B56 M85 2010 Security, risk and the biometric state : governing borders and bodies / | TK7882.B56 M85 2010 Security, risk and the biometric state : governing borders and bodies / | TK7882.B56 N496 2010 Security and access control using biometric technologies / | TK7882.B56 P84 2010 Biometrics : bodies, technologies, biopolitics / | TK7882.B56 P84 2010 Biometrics : bodies, technologies, biopolitics / | TK7882.C56 C293 1992 The CD-I production handbook / |
Includes bibliographical references and index.
PART I -- FUNDAMENTALS. 1. Access Control Using Biometrics. 2. Biometric Traits and Modalities. PART II -- TECHNOLOGY. 3. Biometric Applications and Solutions. 4. Repositories for Database and Template Storage. 5. Legacy and Biometric Systems. 6. Uni-Modal, Multi-modal, and Multi-biometrics Integration. PART III -- ADMINISTRATION. 7. Policy and Program Management. 8. Access Control Methods and Technologies. 9. System Confidentiality, Integrity, and Accessibility. 10. Security and Privacy Issues. 11. Implementation, Operation, and Management Issues. 12. Standards, Organizations, and Legal Environment. Glossary. Appendices. A. Biometrics acronyms. B. Biometrics vendors. Index.
Presents an introduction to biometrics or the study of recognizing individuals based on their unique physical or behavioral traits, as they relate to computer security. This book begins with the basics of biometric technologies and discusses how and why biometric systems are emerging in information security.