gogogo
Syndetics cover image
Image from Syndetics

Biometrics : identity verification in a networked world / Samir Nanavati, Michael Thieme, Raj Nanavati.

By: Contributor(s): Material type: TextTextSeries: Wiley tech brief seriesPublication details: New York ; Chichester : John Wiley & Sons, c2002.Description: xx, 300p. : ill.. ; 24cmISBN:
  • 0471099457
Subject(s): DDC classification:
  • 006.4 NAN
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Moylish Library Main Collection 006.4 NAN (Browse shelf(Opens below)) 1 Available 39002000204421

Enhanced descriptions from Syndetics:

An insight into the biometric industry and the steps for successful deployment

Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have begun to see widespread deployment in network, e-commerce, and retail applications. This book provides in-depth analysis of biometrics as a solution for authenticating employees and customers. Leading authority, Samir Nanavati explores privacy, security, accuracy, system design, user perceptions, and lessons learned in biometric deployments. He also assesses the real-world strengths and weaknesses of leading biometric technologies: finger-scan, iris-scan, facial-scan, voice-scan, and signature-scan. This accessible book is a necessary step in understanding and implementing biometrics.

Demystifies the complex world of optical networks for IT and business managers

Over the past few years, the cost of fiber optic networking has decreased, making it the best solution for providing virtually unlimited bandwidth for corporate LANs and WANs, metropolitan networks, Internet access, and broadband to the home. The only strategic book on optical networking technologies written from a real-world business perspective, Optical Networking demystifies complex fiber technologies for managers, and details the practical business benefits an optical network can offer. Debra Cameron explores established and emerging markets for optical networks as well as the enabling technologies, applications, network architectures, key deployment issues, and cost considerations. She also provides in-depth case studies of optical networks now in use in the United States and abroad.

Wiley computer publishing.

Includes index.

Table of contents provided by Syndetics

  • Introduction (p. xv)
  • Acknowledgments (p. xix)
  • Part 1 Biometric Fundamentals (p. 1)
  • Chapter 1 Why Biometrics? (p. 3)
  • Benefits of Biometrics versus Traditional Authentication Methods (p. 3)
  • Benefits of Biometrics in Identification Systems (p. 6)
  • Conclusion: Evaluating the Benefits of Biometric Systems (p. 6)
  • Chapter 2 Key Biometric Terms and Processes (p. 9)
  • Definitions (p. 9)
  • Discussion: Verification and Identification (p. 12)
  • Logical versus Physical Access (p. 14)
  • How Biometric Matching Works (p. 15)
  • Conclusion (p. 22)
  • Chapter 3 Accuracy in Biometric Systems (p. 23)
  • False Match Rate (p. 24)
  • False NonMatch Rate (p. 27)
  • Failure-to-Enroll (FTE) Rate (p. 33)
  • Derived Metrics (p. 38)
  • Conclusion: Biometric Technologies from an Accuracy Perspective (p. 40)
  • Part 2 Leading Biometric Technologies: What You Need to Know (p. 43)
  • Chapter 4 Finger-Scan (p. 45)
  • Components (p. 46)
  • How Finger-Scan Technology Works (p. 48)
  • Competing Finger-Scan Technologies (p. 54)
  • Finger-Scan Deployments (p. 56)
  • Finger-Scan Strengths (p. 58)
  • Finger-Scan Weaknesses (p. 59)
  • Finger-Scan: Conclusion (p. 61)
  • Chapter 5 Facial-Scan (p. 63)
  • Components (p. 64)
  • How Facial-Scan Technology Works (p. 65)
  • Competing Facial-Scan Technologies (p. 69)
  • Facial-Scan Deployments (p. 72)
  • Facial-Scan Strengths (p. 72)
  • Facial-Scan Weaknesses (p. 74)
  • Facial-Scan: Conclusion (p. 75)
  • Chapter 6 Iris-Scan (p. 77)
  • Components (p. 78)
  • How It Works (p. 79)
  • Deployments (p. 82)
  • Iris-Scan Strengths (p. 83)
  • Iris-Scan Weaknesses (p. 84)
  • Iris-Scan: Conclusion (p. 86)
  • Chapter 7 Voice-Scan (p. 87)
  • Components (p. 88)
  • How It Works (p. 88)
  • Deployments (p. 92)
  • Voice-Scan Strengths (p. 93)
  • Voice-Scan Weaknesses (p. 95)
  • Voice-Scan: Conclusion (p. 97)
  • Chapter 8 Other Physiological Biometrics (p. 99)
  • Hand-Scan (p. 99)
  • Retina-Scan (p. 106)
  • Automated Fingerprint Identification Systems (AFIS) (p. 114)
  • Chapter 9 Other Leading Behavioral Biometrics (p. 123)
  • Signature-Scan (p. 123)
  • Keystroke-Scan (p. 132)
  • Part 3 Biometric Applications and Markets (p. 141)
  • Chapter 10 Categorizing Biometric Applications (p. 143)
  • Defining the Seven Biometric Applications (p. 144)
  • Capacities in Which Individuals Use Biometric Systems (p. 147)
  • Introduction to IBG's Biometric Solution Matrix (p. 147)
  • Chapter 11 Citizen-Facing Applications (p. 151)
  • Criminal Identification (p. 152)
  • Citizen Identification (p. 157)
  • Surveillance (p. 164)
  • Chapter 12 Employee-Facing Applications (p. 171)
  • PC/Network Access (p. 171)
  • Physical Access/Time and Attendance (p. 180)
  • Chapter 13 Customer-Facing Applications (p. 189)
  • E-Commerce/Telephony (p. 190)
  • Retail/ATM/Point of Sale (p. 201)
  • Chapter 14 Biometric Vertical Markets (p. 209)
  • Five Primary Biometric Vertical Markets (p. 210)
  • Law Enforcement (p. 211)
  • Government Sector (p. 214)
  • Financial Sector (p. 220)
  • Healthcare (p. 225)
  • Travel and Immigration (p. 228)
  • Additional Biometric Verticals (p. 231)
  • Part 4 Privacy and Standards in Biometric System Design (p. 235)
  • Chapter 15 Assessing the Privacy Risks of Biometrics (p. 237)
  • Biometric Deployments on a Privacy Continuum (p. 238)
  • Privacy Concerns Associated with Biometric Deployments (p. 239)
  • Defining Application-Specific Privacy Risks: The BioPrivacy Impact Framework (p. 246)
  • Conclusion (p. 255)
  • BioPrivacy Technology Risk Ratings (p. 256)
  • Chapter 16 Designing Privacy-Sympathetic Biometric Systems (p. 259)
  • BioPrivacy Best Practices: Scope and Capabilities (p. 260)
  • IBG BioPrivacy Best Practices: Data Protection (p. 265)
  • BioPrivacy Best Practices: User Control of Personal Data (p. 267)
  • IBG BioPrivacy Best Practices: Disclosure, Auditing, and Accountability (p. 269)
  • Biometrics at the Super Bowl: An IBG BioPrivacy Assessment (p. 273)
  • Conclusion (p. 276)
  • Chapter 17 Biometric Standards (p. 277)
  • Why Standards? (p. 277)
  • Application Programming Interfaces (p. 278)
  • File Format (p. 281)
  • Information Security for Financial Services (p. 281)
  • Additional Efforts (p. 282)
  • Conclusion (p. 284)
  • Index (p. 285)

Author notes provided by Syndetics

Samir Nanavati is a founding partner of International Biometric Group, LLC
Michael Thieme is a Senior Consultant with International Biometric Group
Raj Nanavati is a cofounding partner at International Biometric Group, LLC

Powered by Koha