Identity management with biometrics :: explore the latest innovative solutions to provide secure identification and authentication /
Work with common biometrics such as face, fingerprint, and iris recognition for business and personal use to ensure secure identification and authentication for fintech, homes, and computer systems Key Features Explore the next iteration of identity protection and overcome real-world challenges Unde...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing, Limited,
2020.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | Work with common biometrics such as face, fingerprint, and iris recognition for business and personal use to ensure secure identification and authentication for fintech, homes, and computer systems Key Features Explore the next iteration of identity protection and overcome real-world challenges Understand different biometric use cases to deploy a large-scale biometric system Curated by renowned security ambassador and experienced author Lisa Bock Book Description Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition. Starting with an overview of biometrics, you'll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You'll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You'll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies. By the end of this book, you'll be well-versed with a variety of recognition processes and be able to make the right decisions when implementing biometric technologies. What you will learn Review the advantages and disadvantages of biometric technology Understand the characteristics of an optimal biometric system Discover the uses of biometrics and where they are used Compare different types of errors and see how to tune your system Understand the benefits of multi-factor authentication Work with commonly used biometrics such as face, fingerprint, and iris Analyze a biometric system for usability and accuracy Address privacy concerns and get a glimpse of the future of biometrics Who this book is for Identity Management with Biometrics is for IT managers, security professionals, students, teachers, and anyone invo... |
Beschreibung: | Extracting the features. |
Beschreibung: | 1 online resource (369 pages) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1839213213 9781839213212 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1202454505 | ||
003 | OCoLC | ||
005 | 20250103110447.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 201031s2020 enk ob 001 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d UKAHL |d N$T |d EBLCP |d N$T |d OCLCO |d OCLCF |d OCLCQ |d DST |d OCLCO |d OCLCQ |d OCLCO |d TMA |d OCLCL |d OCLCQ | ||
020 | |a 1839213213 | ||
020 | |a 9781839213212 |q (electronic bk.) | ||
035 | |a (OCoLC)1202454505 | ||
050 | 4 | |a TK7882.B56 | |
082 | 7 | |a 570.191950285 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Bock, Lisa. | |
245 | 1 | 0 | |a Identity management with biometrics : |b explore the latest innovative solutions to provide secure identification and authentication / |c Lisa Bock. |
260 | |a Birmingham : |b Packt Publishing, Limited, |c 2020. | ||
300 | |a 1 online resource (369 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover -- Title Page -- Copyright and Credits -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1 -Understanding Biometric Authentication -- Chapter 01: Exploring Biometric Technology -- Describing biometric technology -- Defining biometrics -- Providing identification -- Verifying authentication -- Appreciating modern biometrics -- Traveling back in time -- Applying a unique attribute -- Comparing biometric categories -- Measuring physiological attributes -- Observing behavioral biometrics -- Summary -- Questions -- Further reading | |
505 | 8 | |a Chapter 02: Biometrics and Mobile Devices -- Securing fintech and other applications -- Ensuring access control -- Staying in compliance -- Tokenizing credit card information -- Designing optimal biometrics for mobile -- Simplifying the user experience -- Understanding haptics -- Incorporating essential biometric technology -- Capturing the image -- Handling the biometric -- Providing security and privacy -- Summary -- Questions -- Further reading -- Chapter 03: Recognizing Biometric Characteristics -- Assessing the desired qualities of a biometric -- Having uniqueness -- Being universal | |
505 | 8 | |a Staying permanent -- Performing accurately -- Ensuring collectability -- Providing an acceptable biometric -- Avoiding circumvention -- Summarizing the operation of a biometric system -- Initiating contact with the user interface -- Obtaining the biometric identifier -- Matching the pattern -- Making a decision -- Comparing application environments -- Classifying different methods -- Accepting various forms of input -- Summary -- Questions -- Further reading -- Chapter 04: Comparing Advantages and Modalities -- Reviewing system approaches -- Networking the biometric system | |
505 | 8 | |a Operating in standalone mode -- Integrating with other systems -- Reviewing common modalities -- Understanding system errors -- Making a correct decision -- Testing a biometric system -- Using multi-factor authentication -- Strengthening a standard login -- Adding a biometric identifier -- Recognizing the push for standards -- Taking a closer look at biometrics -- Developing biometric standards -- Summary -- Questions -- Further reading -- Section 2 -- Applying Biometric Technologies -- Chapter 05: Implementing Fingerprint Technology -- Exploring the evolution of fingerprint technology | |
505 | 8 | |a Classifying fingers -- Managing US fingerprints -- Understanding fingerprint systems -- Scanning the fingers -- Digitizing the image -- Storing the templates -- Matching the patterns -- Extracting the features -- Finding fingerprints everywhere -- Comparing benefits with drawbacks -- Summary -- Questions -- Further reading -- Chapter 06: Using Facial Recognition -- Understanding facial features -- Seeing someone's face -- Studying faces over time -- Moving through facial recognition -- Acquiring the facial image -- Capturing images using 2D or 3D -- Overcoming challenges | |
500 | |a Extracting the features. | ||
520 | |a Work with common biometrics such as face, fingerprint, and iris recognition for business and personal use to ensure secure identification and authentication for fintech, homes, and computer systems Key Features Explore the next iteration of identity protection and overcome real-world challenges Understand different biometric use cases to deploy a large-scale biometric system Curated by renowned security ambassador and experienced author Lisa Bock Book Description Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition. Starting with an overview of biometrics, you'll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You'll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You'll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies. By the end of this book, you'll be well-versed with a variety of recognition processes and be able to make the right decisions when implementing biometric technologies. What you will learn Review the advantages and disadvantages of biometric technology Understand the characteristics of an optimal biometric system Discover the uses of biometrics and where they are used Compare different types of errors and see how to tune your system Understand the benefits of multi-factor authentication Work with commonly used biometrics such as face, fingerprint, and iris Analyze a biometric system for usability and accuracy Address privacy concerns and get a glimpse of the future of biometrics Who this book is for Identity Management with Biometrics is for IT managers, security professionals, students, teachers, and anyone invo... | ||
650 | 0 | |a Biometric identification. |0 http://id.loc.gov/authorities/subjects/sh2001010964 | |
650 | 0 | |a Biometric identification |x Technological innovations. | |
650 | 0 | |a Identification |x Data processing. | |
650 | 6 | |a Identification biométrique. | |
650 | 6 | |a Identification biométrique |x Innovations. | |
650 | 6 | |a Identification |x Informatique. | |
650 | 7 | |a Biometric identification |2 fast | |
758 | |i has work: |a Identity Management with Biometrics (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYXb8YMG73FwgCGC7yw7pd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Bock, Lisa. |t Identity Management with Biometrics : Explore the Latest Innovative Solutions to Provide Secure Identification and Authentication. |d Birmingham : Packt Publishing, Limited, ©2020 |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2630900 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2630900 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH37738399 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL6359501 | ||
938 | |a EBSCOhost |b EBSC |n 2630900 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1202454505 |
---|---|
_version_ | 1829095342380941312 |
adam_text | |
any_adam_object | |
author | Bock, Lisa |
author_facet | Bock, Lisa |
author_role | |
author_sort | Bock, Lisa |
author_variant | l b lb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK7882 |
callnumber-raw | TK7882.B56 |
callnumber-search | TK7882.B56 |
callnumber-sort | TK 47882 B56 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover -- Title Page -- Copyright and Credits -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1 -Understanding Biometric Authentication -- Chapter 01: Exploring Biometric Technology -- Describing biometric technology -- Defining biometrics -- Providing identification -- Verifying authentication -- Appreciating modern biometrics -- Traveling back in time -- Applying a unique attribute -- Comparing biometric categories -- Measuring physiological attributes -- Observing behavioral biometrics -- Summary -- Questions -- Further reading Chapter 02: Biometrics and Mobile Devices -- Securing fintech and other applications -- Ensuring access control -- Staying in compliance -- Tokenizing credit card information -- Designing optimal biometrics for mobile -- Simplifying the user experience -- Understanding haptics -- Incorporating essential biometric technology -- Capturing the image -- Handling the biometric -- Providing security and privacy -- Summary -- Questions -- Further reading -- Chapter 03: Recognizing Biometric Characteristics -- Assessing the desired qualities of a biometric -- Having uniqueness -- Being universal Staying permanent -- Performing accurately -- Ensuring collectability -- Providing an acceptable biometric -- Avoiding circumvention -- Summarizing the operation of a biometric system -- Initiating contact with the user interface -- Obtaining the biometric identifier -- Matching the pattern -- Making a decision -- Comparing application environments -- Classifying different methods -- Accepting various forms of input -- Summary -- Questions -- Further reading -- Chapter 04: Comparing Advantages and Modalities -- Reviewing system approaches -- Networking the biometric system Operating in standalone mode -- Integrating with other systems -- Reviewing common modalities -- Understanding system errors -- Making a correct decision -- Testing a biometric system -- Using multi-factor authentication -- Strengthening a standard login -- Adding a biometric identifier -- Recognizing the push for standards -- Taking a closer look at biometrics -- Developing biometric standards -- Summary -- Questions -- Further reading -- Section 2 -- Applying Biometric Technologies -- Chapter 05: Implementing Fingerprint Technology -- Exploring the evolution of fingerprint technology Classifying fingers -- Managing US fingerprints -- Understanding fingerprint systems -- Scanning the fingers -- Digitizing the image -- Storing the templates -- Matching the patterns -- Extracting the features -- Finding fingerprints everywhere -- Comparing benefits with drawbacks -- Summary -- Questions -- Further reading -- Chapter 06: Using Facial Recognition -- Understanding facial features -- Seeing someone's face -- Studying faces over time -- Moving through facial recognition -- Acquiring the facial image -- Capturing images using 2D or 3D -- Overcoming challenges |
ctrlnum | (OCoLC)1202454505 |
dewey-full | 570.191950285 |
dewey-hundreds | 500 - Natural sciences and mathematics |
dewey-ones | 570 - Biology |
dewey-raw | 570.191950285 |
dewey-search | 570.191950285 |
dewey-sort | 3570.191950285 |
dewey-tens | 570 - Biology |
discipline | Biologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07709cam a2200541 a 4500</leader><controlfield tag="001">ZDB-4-EBA-on1202454505</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20250103110447.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">201031s2020 enk ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">UKAHL</subfield><subfield code="d">N$T</subfield><subfield code="d">EBLCP</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DST</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1839213213</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781839213212</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1202454505</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK7882.B56</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">570.191950285</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bock, Lisa.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Identity management with biometrics :</subfield><subfield code="b">explore the latest innovative solutions to provide secure identification and authentication /</subfield><subfield code="c">Lisa Bock.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing, Limited,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (369 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Title Page -- Copyright and Credits -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1 -Understanding Biometric Authentication -- Chapter 01: Exploring Biometric Technology -- Describing biometric technology -- Defining biometrics -- Providing identification -- Verifying authentication -- Appreciating modern biometrics -- Traveling back in time -- Applying a unique attribute -- Comparing biometric categories -- Measuring physiological attributes -- Observing behavioral biometrics -- Summary -- Questions -- Further reading</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 02: Biometrics and Mobile Devices -- Securing fintech and other applications -- Ensuring access control -- Staying in compliance -- Tokenizing credit card information -- Designing optimal biometrics for mobile -- Simplifying the user experience -- Understanding haptics -- Incorporating essential biometric technology -- Capturing the image -- Handling the biometric -- Providing security and privacy -- Summary -- Questions -- Further reading -- Chapter 03: Recognizing Biometric Characteristics -- Assessing the desired qualities of a biometric -- Having uniqueness -- Being universal</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Staying permanent -- Performing accurately -- Ensuring collectability -- Providing an acceptable biometric -- Avoiding circumvention -- Summarizing the operation of a biometric system -- Initiating contact with the user interface -- Obtaining the biometric identifier -- Matching the pattern -- Making a decision -- Comparing application environments -- Classifying different methods -- Accepting various forms of input -- Summary -- Questions -- Further reading -- Chapter 04: Comparing Advantages and Modalities -- Reviewing system approaches -- Networking the biometric system</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Operating in standalone mode -- Integrating with other systems -- Reviewing common modalities -- Understanding system errors -- Making a correct decision -- Testing a biometric system -- Using multi-factor authentication -- Strengthening a standard login -- Adding a biometric identifier -- Recognizing the push for standards -- Taking a closer look at biometrics -- Developing biometric standards -- Summary -- Questions -- Further reading -- Section 2 -- Applying Biometric Technologies -- Chapter 05: Implementing Fingerprint Technology -- Exploring the evolution of fingerprint technology</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Classifying fingers -- Managing US fingerprints -- Understanding fingerprint systems -- Scanning the fingers -- Digitizing the image -- Storing the templates -- Matching the patterns -- Extracting the features -- Finding fingerprints everywhere -- Comparing benefits with drawbacks -- Summary -- Questions -- Further reading -- Chapter 06: Using Facial Recognition -- Understanding facial features -- Seeing someone's face -- Studying faces over time -- Moving through facial recognition -- Acquiring the facial image -- Capturing images using 2D or 3D -- Overcoming challenges</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Extracting the features.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Work with common biometrics such as face, fingerprint, and iris recognition for business and personal use to ensure secure identification and authentication for fintech, homes, and computer systems Key Features Explore the next iteration of identity protection and overcome real-world challenges Understand different biometric use cases to deploy a large-scale biometric system Curated by renowned security ambassador and experienced author Lisa Bock Book Description Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition. Starting with an overview of biometrics, you'll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You'll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You'll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies. By the end of this book, you'll be well-versed with a variety of recognition processes and be able to make the right decisions when implementing biometric technologies. What you will learn Review the advantages and disadvantages of biometric technology Understand the characteristics of an optimal biometric system Discover the uses of biometrics and where they are used Compare different types of errors and see how to tune your system Understand the benefits of multi-factor authentication Work with commonly used biometrics such as face, fingerprint, and iris Analyze a biometric system for usability and accuracy Address privacy concerns and get a glimpse of the future of biometrics Who this book is for Identity Management with Biometrics is for IT managers, security professionals, students, teachers, and anyone invo...</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Biometric identification.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2001010964</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Biometric identification</subfield><subfield code="x">Technological innovations.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Identification</subfield><subfield code="x">Data processing.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Identification biométrique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Identification biométrique</subfield><subfield code="x">Innovations.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Identification</subfield><subfield code="x">Informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Biometric identification</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Identity Management with Biometrics (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYXb8YMG73FwgCGC7yw7pd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Bock, Lisa.</subfield><subfield code="t">Identity Management with Biometrics : Explore the Latest Innovative Solutions to Provide Secure Identification and Authentication.</subfield><subfield code="d">Birmingham : Packt Publishing, Limited, ©2020</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2630900</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2630900</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH37738399</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6359501</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2630900</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1202454505 |
illustrated | Not Illustrated |
indexdate | 2025-04-11T08:47:30Z |
institution | BVB |
isbn | 1839213213 9781839213212 |
language | English |
oclc_num | 1202454505 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (369 pages) |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Packt Publishing, Limited, |
record_format | marc |
spelling | Bock, Lisa. Identity management with biometrics : explore the latest innovative solutions to provide secure identification and authentication / Lisa Bock. Birmingham : Packt Publishing, Limited, 2020. 1 online resource (369 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Print version record. Includes bibliographical references and index. Cover -- Title Page -- Copyright and Credits -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1 -Understanding Biometric Authentication -- Chapter 01: Exploring Biometric Technology -- Describing biometric technology -- Defining biometrics -- Providing identification -- Verifying authentication -- Appreciating modern biometrics -- Traveling back in time -- Applying a unique attribute -- Comparing biometric categories -- Measuring physiological attributes -- Observing behavioral biometrics -- Summary -- Questions -- Further reading Chapter 02: Biometrics and Mobile Devices -- Securing fintech and other applications -- Ensuring access control -- Staying in compliance -- Tokenizing credit card information -- Designing optimal biometrics for mobile -- Simplifying the user experience -- Understanding haptics -- Incorporating essential biometric technology -- Capturing the image -- Handling the biometric -- Providing security and privacy -- Summary -- Questions -- Further reading -- Chapter 03: Recognizing Biometric Characteristics -- Assessing the desired qualities of a biometric -- Having uniqueness -- Being universal Staying permanent -- Performing accurately -- Ensuring collectability -- Providing an acceptable biometric -- Avoiding circumvention -- Summarizing the operation of a biometric system -- Initiating contact with the user interface -- Obtaining the biometric identifier -- Matching the pattern -- Making a decision -- Comparing application environments -- Classifying different methods -- Accepting various forms of input -- Summary -- Questions -- Further reading -- Chapter 04: Comparing Advantages and Modalities -- Reviewing system approaches -- Networking the biometric system Operating in standalone mode -- Integrating with other systems -- Reviewing common modalities -- Understanding system errors -- Making a correct decision -- Testing a biometric system -- Using multi-factor authentication -- Strengthening a standard login -- Adding a biometric identifier -- Recognizing the push for standards -- Taking a closer look at biometrics -- Developing biometric standards -- Summary -- Questions -- Further reading -- Section 2 -- Applying Biometric Technologies -- Chapter 05: Implementing Fingerprint Technology -- Exploring the evolution of fingerprint technology Classifying fingers -- Managing US fingerprints -- Understanding fingerprint systems -- Scanning the fingers -- Digitizing the image -- Storing the templates -- Matching the patterns -- Extracting the features -- Finding fingerprints everywhere -- Comparing benefits with drawbacks -- Summary -- Questions -- Further reading -- Chapter 06: Using Facial Recognition -- Understanding facial features -- Seeing someone's face -- Studying faces over time -- Moving through facial recognition -- Acquiring the facial image -- Capturing images using 2D or 3D -- Overcoming challenges Extracting the features. Work with common biometrics such as face, fingerprint, and iris recognition for business and personal use to ensure secure identification and authentication for fintech, homes, and computer systems Key Features Explore the next iteration of identity protection and overcome real-world challenges Understand different biometric use cases to deploy a large-scale biometric system Curated by renowned security ambassador and experienced author Lisa Bock Book Description Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition. Starting with an overview of biometrics, you'll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You'll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You'll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies. By the end of this book, you'll be well-versed with a variety of recognition processes and be able to make the right decisions when implementing biometric technologies. What you will learn Review the advantages and disadvantages of biometric technology Understand the characteristics of an optimal biometric system Discover the uses of biometrics and where they are used Compare different types of errors and see how to tune your system Understand the benefits of multi-factor authentication Work with commonly used biometrics such as face, fingerprint, and iris Analyze a biometric system for usability and accuracy Address privacy concerns and get a glimpse of the future of biometrics Who this book is for Identity Management with Biometrics is for IT managers, security professionals, students, teachers, and anyone invo... Biometric identification. http://id.loc.gov/authorities/subjects/sh2001010964 Biometric identification Technological innovations. Identification Data processing. Identification biométrique. Identification biométrique Innovations. Identification Informatique. Biometric identification fast has work: Identity Management with Biometrics (Text) https://id.oclc.org/worldcat/entity/E39PCYXb8YMG73FwgCGC7yw7pd https://id.oclc.org/worldcat/ontology/hasWork Print version: Bock, Lisa. Identity Management with Biometrics : Explore the Latest Innovative Solutions to Provide Secure Identification and Authentication. Birmingham : Packt Publishing, Limited, ©2020 |
spellingShingle | Bock, Lisa Identity management with biometrics : explore the latest innovative solutions to provide secure identification and authentication / Cover -- Title Page -- Copyright and Credits -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1 -Understanding Biometric Authentication -- Chapter 01: Exploring Biometric Technology -- Describing biometric technology -- Defining biometrics -- Providing identification -- Verifying authentication -- Appreciating modern biometrics -- Traveling back in time -- Applying a unique attribute -- Comparing biometric categories -- Measuring physiological attributes -- Observing behavioral biometrics -- Summary -- Questions -- Further reading Chapter 02: Biometrics and Mobile Devices -- Securing fintech and other applications -- Ensuring access control -- Staying in compliance -- Tokenizing credit card information -- Designing optimal biometrics for mobile -- Simplifying the user experience -- Understanding haptics -- Incorporating essential biometric technology -- Capturing the image -- Handling the biometric -- Providing security and privacy -- Summary -- Questions -- Further reading -- Chapter 03: Recognizing Biometric Characteristics -- Assessing the desired qualities of a biometric -- Having uniqueness -- Being universal Staying permanent -- Performing accurately -- Ensuring collectability -- Providing an acceptable biometric -- Avoiding circumvention -- Summarizing the operation of a biometric system -- Initiating contact with the user interface -- Obtaining the biometric identifier -- Matching the pattern -- Making a decision -- Comparing application environments -- Classifying different methods -- Accepting various forms of input -- Summary -- Questions -- Further reading -- Chapter 04: Comparing Advantages and Modalities -- Reviewing system approaches -- Networking the biometric system Operating in standalone mode -- Integrating with other systems -- Reviewing common modalities -- Understanding system errors -- Making a correct decision -- Testing a biometric system -- Using multi-factor authentication -- Strengthening a standard login -- Adding a biometric identifier -- Recognizing the push for standards -- Taking a closer look at biometrics -- Developing biometric standards -- Summary -- Questions -- Further reading -- Section 2 -- Applying Biometric Technologies -- Chapter 05: Implementing Fingerprint Technology -- Exploring the evolution of fingerprint technology Classifying fingers -- Managing US fingerprints -- Understanding fingerprint systems -- Scanning the fingers -- Digitizing the image -- Storing the templates -- Matching the patterns -- Extracting the features -- Finding fingerprints everywhere -- Comparing benefits with drawbacks -- Summary -- Questions -- Further reading -- Chapter 06: Using Facial Recognition -- Understanding facial features -- Seeing someone's face -- Studying faces over time -- Moving through facial recognition -- Acquiring the facial image -- Capturing images using 2D or 3D -- Overcoming challenges Biometric identification. http://id.loc.gov/authorities/subjects/sh2001010964 Biometric identification Technological innovations. Identification Data processing. Identification biométrique. Identification biométrique Innovations. Identification Informatique. Biometric identification fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2001010964 |
title | Identity management with biometrics : explore the latest innovative solutions to provide secure identification and authentication / |
title_auth | Identity management with biometrics : explore the latest innovative solutions to provide secure identification and authentication / |
title_exact_search | Identity management with biometrics : explore the latest innovative solutions to provide secure identification and authentication / |
title_full | Identity management with biometrics : explore the latest innovative solutions to provide secure identification and authentication / Lisa Bock. |
title_fullStr | Identity management with biometrics : explore the latest innovative solutions to provide secure identification and authentication / Lisa Bock. |
title_full_unstemmed | Identity management with biometrics : explore the latest innovative solutions to provide secure identification and authentication / Lisa Bock. |
title_short | Identity management with biometrics : |
title_sort | identity management with biometrics explore the latest innovative solutions to provide secure identification and authentication |
title_sub | explore the latest innovative solutions to provide secure identification and authentication / |
topic | Biometric identification. http://id.loc.gov/authorities/subjects/sh2001010964 Biometric identification Technological innovations. Identification Data processing. Identification biométrique. Identification biométrique Innovations. Identification Informatique. Biometric identification fast |
topic_facet | Biometric identification. Biometric identification Technological innovations. Identification Data processing. Identification biométrique. Identification biométrique Innovations. Identification Informatique. Biometric identification |
work_keys_str_mv | AT bocklisa identitymanagementwithbiometricsexplorethelatestinnovativesolutionstoprovidesecureidentificationandauthentication |