본문 바로가기

리디 접속이 원활하지 않습니다.
강제 새로 고침(Ctrl + F5)이나 브라우저 캐시 삭제를 진행해주세요.
계속해서 문제가 발생한다면 리디 접속 테스트를 통해 원인을 파악하고 대응 방법을 안내드리겠습니다.
테스트 페이지로 이동하기

Identity Management with Biometrics 상세페이지

컴퓨터/IT 개발/프로그래밍 ,   컴퓨터/IT IT 해외원서

Identity Management with Biometrics

Explore the latest innovative solutions to provide secure identification and authentication
소장전자책 정가24,000
판매가24,000
Identity Management with Biometrics 표지 이미지

Identity Management with Biometrics작품 소개

<Identity Management with Biometrics> Work with common biometrics such as face, fingerprint, and iris recognition for business and personal use to ensure secure identification and authentication for fintech, homes, and computer systems

▶Book Description
Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition.

Starting with an overview of biometrics, you'll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You'll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You'll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies.

By the end of this book, you'll be well-versed with a variety of recognition processes and be able to make the right decisions when implementing biometric technologies.

▶What You Will Learn
⦁Review the advantages and disadvantages of biometric technology
⦁Understand the characteristics of an optimal biometric system
⦁Discover the uses of biometrics and where they are used
⦁Compare different types of errors and see how to tune your system
⦁Understand the benefits of multi-factor authentication
⦁Work with commonly used biometrics such as face, fingerprint, and iris
⦁Analyze a biometric system for usability and accuracy
⦁Address privacy concerns and get a glimpse of the future of biometrics

▶Key Features
⦁Explore the next iteration of identity protection and overcome real-world challenges
⦁Understand different biometric use cases to deploy a large-scale biometric system
⦁Curated by renowned security ambassador and experienced author Lisa Bock

▶Who This Book Is For
Identity Management with Biometrics is for IT managers, security professionals, students, teachers, and anyone involved in selecting, purchasing, integrating, or securing a biometric system. This book will help you understand how to select the right biometric system for your organization and walk you through the steps for implementing identity management and authentication. A basic understanding of biometric authentication techniques, such as fingerprint and facial recognition, and the importance of providing a secure method of authenticating an individual will help you make the most of the book.

▶What this book covers
⦁ Chapter 1, Exploring Biometric Technology, covers the concept of biometrics and the methods available to provide identification and authentication. We'll compare physiological versus behavioral biometrics, and examine common biometrics such as fingerprint, facial, iris, and voice recognition.

⦁ Chapter 2, Biometrics and Mobile Devices, teaches you the real-world applications of biometrics in mobile devices. This chapter covers the various biometric methods used in Fintech, such as voice and facial recognition, to enable authentication and payment processing.

⦁ Chapter 3, Recognizing Biometric Characteristics, outlines the desired qualities of a biometric, including uniqueness, performance, distinctiveness, and permanence, and reviews the general operation of biometric technology in various environments.

⦁ Chapter 4, Comparing Advantages and Modalities, explains the many types of biometric systems, along with their advantages/disadvantages. It describes the different types of biometrics systems, system errors, multimodal usage, and practical examples of different applications.

⦁ Chapter 5, Implementing Fingerprint Technology, provides a basic understanding of the evolution of fingerprint technology. We'll cover feature extraction and minutiae along with the different types of fingerprint systems in use today.

⦁ Chapter 6, Using Facial Recognition, provides an overview of the process of acquiring facial images using two-dimensional (2D) and three-dimensional (3D) sensors, and covers how systems extract the features along with how facial recognition is used today.

⦁ Chapter 7, Learning Iris Recognition, outlines the unique nature of the iris along with the structure of the eye. We'll step through capturing and sensing iris images, to matching templates and preventing spoofing, and will examine some of the applications for iris recognition.

⦁ Chapter 8, Using Voice Recognition, first reviews the evolution of two related technologies: voice recognition and speech recognition. We'll then step through the process of enrolling and matching and discuss the various ways we can use voice recognition.

⦁ Chapter 9, Considering Alternate Biometrics, outlines several lesser-known biometrics such as gait recognition and deoxyribonucleic acid (DNA). We'll cover an overview of keyboard dynamics and signature verification, along with using tattoos, scars, and ear biometrics.

⦁ Chapter 10, Selecting the Right Biometric, begins with an overview of the System Development Life Cycle and the requirements process for a biometric system. We'll also cover the factors that need to be considered when selecting a system, including usability, accuracy, speed, and efficiency.

⦁ Chapter 11, Integrating the Biometric System, moves through network and implementation considerations, compression methods, and securing biometric data, along with business continuity, disaster recovery, and integrating with the directory.

⦁ Chapter 12, Testing and System Deployment, stresses the importance of testing the system, and some of the tasks that the team will need to complete prior to deployment, such as providing education and awareness, enrolling the users, and tuning the decision process.

⦁ Chapter 13, Discovering Practical Biometric Applications, covers the use of biometrics in law enforcement and forensics. You'll see how we can use biometrics for large venues; to control access to assets, buildings, and systems; and some other novel uses of biometrics.

⦁ Chapter 14, Addressing Privacy Concerns, compares privacy laws in the US and Europe, and covers biometrics and the US' Fifth Amendment. We'll see the importance of biometric standards, and take a glimpse into the future of biometrics.


출판사 서평

▶ Preface
Identity Management with Biometrics will teach you the broad strokes of biometric technology. You'll compare the different types of biometrics and learn why one may be a better fit than another according to your needs. With easy-to-follow details on the various types of biometric identification and authentication, examples, and self-assessment questions, this guide will outline the next generation of identity management.

By the end of this book, you will be well versed in a variety of recognition processes and be able to make the right decisions when implementing biometric technologies.


저자 소개

▶About the Author
- Lisa Bock
Lisa Bock is an experienced author with a demonstrated history of working in the e-learning industry. She is a Security Ambassador with a broad range of IT skills and knowledge, including networking, Cisco CyberOps, Wireshark, biometrics, and the IoT. Lisa is an author for LinkedIn Learning along with being an award-winning speaker who has presented at several national conferences. She holds a MS in computer information systems/information assurance from UMGC. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, PA) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband Mike enjoy bike riding, watching movies, and traveling.

목차

▶TABLE of CONTENTS
▷ Section 1 –Understanding Biometric Authentication
⦁ Chapter 1: Exploring Biometric Technology
⦁ Chapter 2: Biometrics and Mobile Devices
⦁ Chapter 3: Recognizing Biometric Characteristics
⦁ Chapter 4: Comparing Advantages and Modalities

▷ Section 2 – Applying Biometric Technologies
⦁ Chapter 5: Implementing Fingerprint Technology
⦁ Chapter 6: Using Facial Recognition
⦁ Chapter 7: Learning Iris Recognition
⦁ Chapter 8: Using Voice Recognition
⦁ Chapter 9: Considering Alternate Biometrics

▷ Section 3 – Deploying a Large-Scale Biometric System
⦁ Chapter 10: Selecting the Right Biometric
⦁ Chapter 11: Integrating the Biometric System
⦁ Chapter 12: Testing and System Deployment
⦁ Chapter 13: Discovering Practical Biometric Applications
⦁ Chapter 14: Addressing Privacy Concerns
Assessments


리뷰

구매자 별점

0.0

점수비율
  • 5
  • 4
  • 3
  • 2
  • 1

0명이 평가함

리뷰 작성 영역

이 책을 평가해주세요!

내가 남긴 별점 0.0

별로예요

그저 그래요

보통이에요

좋아요

최고예요

별점 취소

구매자 표시 기준은 무엇인가요?

'구매자' 표시는 리디에서 유료도서 결제 후 다운로드 하시거나 리디셀렉트 도서를 다운로드하신 경우에만 표시됩니다.

무료 도서 (프로모션 등으로 무료로 전환된 도서 포함)
'구매자'로 표시되지 않습니다.
시리즈 도서 내 무료 도서
'구매자’로 표시되지 않습니다. 하지만 같은 시리즈의 유료 도서를 결제한 뒤 리뷰를 수정하거나 재등록하면 '구매자'로 표시됩니다.
영구 삭제
도서를 영구 삭제해도 ‘구매자’ 표시는 남아있습니다.
결제 취소
‘구매자’ 표시가 자동으로 사라집니다.

이 책과 함께 구매한 책


이 책과 함께 둘러본 책



본문 끝 최상단으로 돌아가기

spinner
모바일 버전