Biometrics for Dummies takes a look at what this young industry has to offer, how the various systems work, what factors come into play in choosing a biometric system for modern security needs, and what is coming to market in the future. Covers pattern recognition, double-factor authentication, system implementation considerations, identifying errors and determining a systems accuracy, integrating biometrics with an existing security system, establishing a biometrics policy and dealing with privacy issues, and discusses emerging biometric technologies and case studies of biometrics in action.


About the Authors
Peter Gregory, CISA, CISSP, is the author of several books including IT Disaster Recovery Planning For Dummies, Blocking Spam & Spyware For Dummies (with Mike Simon) and CISSP For Dummies.
Peter is the security and risk manager at a financial management software company located in Redmond, Washington. Prior to this, he held tactical and strategic security positions in large wireless telecommunications organizations.
He has also held development and operations positions in casino gaming-management systems, banking, government, nonprofit organizations, and academia since the late 1970s. He is a member of the Board of Advisors and an occasional lecturer for the NSA-certified University of Washington
Certificate Program in Information Assurance & Cybersecurity.

Peter can be found at www.peterhgregory.com.
Michael A. Simon is the author of The Internet Starter Kit for Windows (with Adam Engst and Corwin S. Low) and Blocking Spam & Spyware For Dummies (with Peter Gregory).
Mike has been working in computer security and policy development since 1985, working at the time for the University of Idaho, a regional pioneer in computer security and one of the first NSA Centers of Excellence in Information Assurance Education.
Currently, Mike is an adjunct faculty member for the University of Washington, and occasionally lectures at Seattle University, University of Idaho, and several civic organizations on the subject of information assurance and computer security. He sits on the advisory board for the Information Assurance certificate program for the University of Washington, the technical advisory board for Goldfish Holdings, Inc., the Advisory Board for the Computer Science Department at the University of Idaho, and on the Founders Board for the Information School at the University of Washington.

  • Introduction(第1頁)
    • About This Book(第1頁)
    • Foolish Assumptions(第2頁)
    • Conventions Used in This Book(第2頁)
    • What You Don’t Have to Read(第2頁)
    • How This Book Is Organized(第2頁)
    • Icons Used in This Book(第4頁)
    • Where to Go from Here(第4頁)
    • Write to Us!(第5頁)
  • Part I: Getting Started with Biometrics(第7頁)
    • Chapter 1: Understanding Biometrics(第9頁)
    • Chapter 2: Protecting Assets with Biometrics(第21頁)
    • Chapter 3: Biometrics in Our Lives(第35頁)
  • Part II: Types of Biometrics(第61頁)
    • Chapter 4: Fingerprint and Hand Biometrics(第63頁)
    • Chapter 5: Signature Biometrics(第75頁)
    • Chapter 6: Retina and Facial Biometrics(第89頁)
    • Chapter 7: Other Types of Biometric Identification Schemes(第101頁)
  • Part III: Implementing and Using Biometrics(第119頁)
    • Chapter 8: Selecting a Biometrics Solution(第121頁)
    • Chapter 9: Implementing, Supporting, and Maintaining a Biometrics Solution(第141頁)
    • Chapter 10: Securing Biometrics Systems(第163頁)
    • Chapter 11: The Future of Biometrics(第185頁)
  • Part IV: The Part of Tens(第207頁)
    • Chapter 12: Ten Tools Used in Biometrics(第209頁)
    • Chapter 13: Ten Biometrics Web Sites(第217頁)
    • Chapter 14: Ten Essentials for Biometrics Success(第225頁)
    • Chapter 15: Ten Biometrics Scenarios to Plan For(第235頁)
    • Chapter 16: Ten Benefits of Biometrics(第245頁)
  • Part V: Appendixes(第253頁)
    • Appendix A: Comparing Biometrics Solutions(第255頁)
    • Appendix B: Controlling Physical Access(第261頁)
    • Appendix C: Glossary(第269頁)
  • Index(第277頁)
紙本書 NT$ 960
NT$ 672

還沒安裝 HyRead 3 嗎?馬上免費安裝~
QR Code